Udacity part of Accenture logo
Log InJoin for Free

Enterprise-Wide Application Security

Course

Application security is a critical part of any enterprise security plan. We will be cover how to perform a threat assessment by doing threat modeling and pen testing. This course will teach mitigation and defensive strategies in an application software development lifecycle. The focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the different ways they enhance their security posture across on-premise, cloud, containers, and APIs.

Application security is a critical part of any enterprise security plan. We will be cover how to perform a threat assessment by doing threat modeling and pen testing. This course will teach mitigation and defensive strategies in an application software development lifecycle. The focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the different ways they enhance their security posture across on-premise, cloud, containers, and APIs.

Beginner

4 weeks

Real-world Projects

Completion Certificate

Last Updated June 13, 2024

Skills you'll learn:

Container vulnerability management • API security • Threat modeling • Nessus

Prerequisites:

Computer networking basics • Cybersecurity fluency • Cloud computing fluency

Course Lessons

Lesson 1

Introduction to Enterprise-Wide Application Security

This is the welcome lesson to Enterprise-Wide Application Security. Here you'll get a quick overview of what we'll cover in the course.

Lesson 2

Designing Security Architecture

Designing security architecture is the first phase, where you set the teams and architecture. You will learn about DevSecOps, SDLC, and security architecture in this lesson.

Lesson 3

Threat Hunting

In the threat hunting phase, you will proactively find security issues in the product. You will learn about threat modeling, identify vulnerabilities, vulnerability scanning, and pen test roadmap.

Lesson 4

Container Vulnerabilities

In this lesson, you will scan containers, research container vulnerabilities, and mitigate container vulnerabilities, so that you can better handle the actual deployment and cloud infrastructure.

Lesson 5

API Vulnerabilities

API service is what the end-users will finally use. In this lesson, you will identify coding vulnerabilities, mitigate coding vulnerabilities, and learn about monitoring and analytics.

Lesson 6 • Project

CryptoV4ULT Enterprise Security Assessment Project

In this project, you will become the lead security architect for a new startup’s web application and be tasked to identify vulnerabilities and creating a roadmap for mitigation.

Taught By The Best

Photo of Vamsee Kandimalla

Vamsee Kandimalla

Cybersecurity Architect, Head of Product Technology

Vamsee has wide-ranging security experience, in sectors such as defense and automotive. He studied electrical engineering, then focused on cybersecurity during graduate school at Carnegie Mellon. He enjoys working on latest technologies and high-impact solutions.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Unlock access to Enterprise-Wide Application Security and the rest of our best-in-class catalog

  • Unlimited access to our top-rated courses

  • Real-world projects

  • Personalized project reviews

  • Program certificates

  • Proven career outcomes

Full Catalog Access

One subscription opens up this course and our entire catalog of projects and skills.

Month-To-Month

4 Months

*

Average time to complete a Nanodegree program

*Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Your subscription also includes:

Get Started Today

Enterprise-Wide Application Security

Month-To-Month


  • Unlimited access to our top-rated courses
  • Real-world projects
  • Personalized project reviews
  • Program certificates
  • Proven career outcomes

4 Months

Average time to complete a Nanodegree program

  • All the same great benefits in our month-to-month plan
  • Most cost-effective way to acquire a new set of skills
Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Related Programs

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2024 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2024 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.