Udacity part of Accenture logo

Enterprise Perimeter and Network Security

Course

In this course, you'll learn how to: design a secure network architecture; build secure network architectures in Azure; set up continuous monitoring and alerts using a SIEM; and create a Zero Trust Model.

In this course, you'll learn how to: design a secure network architecture; build secure network architectures in Azure; set up continuous monitoring and alerts using a SIEM; and create a Zero Trust Model.

Beginner

4 weeks

Real-world Projects

Completion Certificate

Last Updated May 7, 2024

Skills you'll learn:

Zero trust security model • Secure network architecture design • Security information and event management • Soar platforms

Prerequisites:

Basic Linux • Client-server model • Cloud environment configuration

Course Lessons

Lesson 1

Introduction to Enterprise Perimeter and Network Security

In this introductory lesson, we'll give you a helpful overview of the course that will set you up for success!

Lesson 2

Network Security Architecture

In this lesson we'll provide you an introduction to network security architecture for enterprise.

Lesson 3

Building an Enterprise Network

In this lesson we are going to take all the concepts we learned from Network Security Architecture and use them to build our own secure enterprise network in Microsoft Azure.

Lesson 4

Continuous Monitoring with a SIEM

In this lesson we'll learn how to set up continuous monitoring for our enterprise network through the use of a SIEM.

Lesson 5

Zero Trust

In this lesson we'll introduce you to a new school of thought in how enterprises should best secure their network - Zero Trust.

Lesson 6 • Project

Project: Securing the Perimeter

In this project, you'll design a secure network architecture for a simulated business context, build that design in Azure, set up monitoring with a SIEM, and create a Zero Trust Model.

Taught By The Best

Photo of Milind Adari

Milind Adari

SECURITY ENGINEER

Milind Adari is a Security Engineer at The Associated Press and an Adjunct Instructor at Columbia University. He is responsible for protecting journalists all around the world from malicious threat actors and state-sponsored attacks, all the while educating students and professionals in cybersecurity.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Enroll in Enterprise Perimeter and Network Security. Choose the plan that works for you

All Access monthly

  • Unlimited access to our top-rated courses

  • Personalized Career Services

  • Cancel Anytime

  • Real-world projects

  • Personalized project reviews

  • Program certificates

Best Value

All Access bundle1

  • All the same great benefits as our monthly plan

  • The most cost-effective way to develop the skills you want

  1. 1Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Your subscription also includes:

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2024 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2024 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.