Pay as you go
- Maximum flexibility to learn at your own pace.
- Cancel anytime.
At 5-10 hours/week
Get access to the classroom immediately upon enrollment
Linux and Azure.
This course is designed to take you through the perspective of an enterprise and how they design a secure network architecture. The topics in this course will cover current enterprise perimeter and network security, network security architecture, building an enterprise network, continuous monitoring with a SIEM, and Zero Trust.
With data being a core driver of today’s growth and the number of devices increasing, businesses have seen a rise in the number of types of endpoints. These factors make enterprise endpoint security more difficult since there are more potential vulnerable channels of cyberattack, and they have been compounded by remote work and the growing number of connected devices (i.e. mobile phones, tablets, etc). Moreover, 89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data. This course covers best practices of safeguarding the data and workflows associated with the individual devices that connect to your enterprise network.
Application security is a critical part of any enterprise security plan. Similar to the application security course in the security engineer nanodegree, we will be covering how to perform a threat assessment but will get more granular by doing threat modeling and looking at how to harden applications. This course will teach students mitigation and defensive strategies in an application software development lifecycle. The focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the different ways they enhance their security posture across on prem, cloud, containers, and apis.
Tackling cyber risk requires a very strategic approach that starts with securing one of the greatest assets within the enterprise—data. We’ll start this course by exploring the concept of data governance to build a foundation for understanding, classifying, and protecting data. In the bulk of the course, students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity monitoring, and back up strategy.
Milind Adari is a Security Engineer at The Associated Press and an Adjunct Instructor at Columbia University. He is responsible for protecting journalists all around the world from malicious threat actors and state-sponsored attacks, all the while educating students and professionals in cybersecurity.
INFORMATION SECURITY ENGINEER
Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.
Cybersecurity Architect, Head of Product Technology
Vamsee has wide-ranging security experience, in sectors such as defense and automotive. He studied electrical engineering, then focused on cybersecurity during graduate school at Carnegie Mellon. He enjoys working on latest technologies and high-impact solutions.
Founder & CEO, Cyber Pop-up
Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.
Pay as you go
A well-prepared learner is familiar with relevant platforms (Linux and Azure) and has some experience conducting administration with those platforms, such as: