Udacity part of Accenture logo
Log InJoin for Free

Analyzing Security Threats

Course

In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.

In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.

Intermediate

2 weeks

Real-world Projects

Completion Certificate

Last Updated May 12, 2023

Skills you'll learn:

Threat modeling • Threat actors • Internal threat mitigation • Cybersecurity fluency

Prerequisites:

Cybersecurity fluency • IT architecture diagramming • Command line interface basics

Course Lessons

Lesson 1

Introduction to Analyzing Threats

In this lesson, you'll be introduced to what you'll be learning about in this course!

Lesson 2

Identifying Security Threats

In this lesson, you will learn about internal threats, external threats, and the OWASP Top 10.

Lesson 3

Mitigating Threats

In this lesson, you will learn different mitigation strategies and the threats they mitigate.

Lesson 4

Threat Modeling

In this lesson, you will use your new skills to create Threat Models for different threat scenarios.

Lesson 5 • Project

Project: Insecure Juice Shop

In this lesson, you will work with a large company to assess threats and suggest mitigations.

Taught By The Best

Photo of Milind Adari

Milind Adari

SECURITY ENGINEER

Milind Adari is a Security Engineer at The Associated Press and an Adjunct Instructor at Columbia University. He is responsible for protecting journalists all around the world from malicious threat actors and state-sponsored attacks, all the while educating students and professionals in cybersecurity.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Choose the right learning path for your goals

All Access monthly

  • Unlimited access to our top-rated courses

  • Personalized Career Services

  • Cancel Anytime

  • Real-world projects

  • Personalized project reviews

  • Program certificates

Best Value

All Access bundle1

  • All the same great benefits as our monthly plan

  • The most cost-effective way to develop the skills you want

  1. 1Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Your subscription also includes:

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2024 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2024 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.