Lesson 1
Introduction to Defending and Securing Systems
Course introduction to Introduction to Defending and Securing Systems
Course
In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
Beginner
3 weeks
Real-world Projects
Completion Certificate
Last Updated August 5, 2024
Skills you'll learn:
Prerequisites:
Lesson 1
Course introduction to Introduction to Defending and Securing Systems
Lesson 2
In this lesson you will learn about best practices in defending computer systems.
Lesson 3
In this lesson you will learn how to secure networks.
Lesson 4
In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
Lesson 5
In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
Lesson 6 • Project
This lesson is the project lesson for Defending and Securing Systems course.
Information Security Engineer
Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
3 weeks
, Intermediate
1 month
, Intermediate
4 weeks
, Intermediate
2 weeks
, Intermediate
4 weeks
, Intermediate
2 weeks
, Intermediate
1 month
, Intermediate
3 weeks
, Beginner
3 weeks
, Beginner
3 weeks
, Beginner
4 weeks
, Beginner
3 weeks
, Intermediate
(115)
3 months
, Beginner
4 weeks
, Advanced
3 weeks
, Beginner
3 weeks
, Advanced