Skip to content

Introduction to Cybersecurity

Nanodegree Program

Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.

Enroll Now
  • Estimated time
    4 months

    At 10 hours/week

  • Enroll by
    June 7, 2023

    Get access to the classroom immediately on enrollment

  • Skills acquired
    Threat Intelligence, Cryptography, Vulnerability Management
In collaboration with:
  • SecurityScorecard

What you will learn

  1. Introduction to Cybersecurity

    4 months to complete

    Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

    Prerequisite knowledge

    Basic knowledge of network connectivity and OS fundamentals

    1. Cybersecurity Foundations

      This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

    2. Defending and Securing Systems

      Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

    3. Threats, Vulnerabilities, and Incident Response

      During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.

    4. Governance, Risk, and Compliance

      Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.

All our programs include

  • Real-world projects from industry experts

    With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

  • Real-time support

    On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.

  • Career services

    You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.

  • Flexible learning program

    Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

Program offerings

  • Class content

    • Real-world projects
    • Project reviews
    • Project feedback from experienced reviewers
  • Student services

    • Student community
    • Real-time support
  • Career services

    • Github review
    • Linkedin profile optimization

Succeed with personalized services.

We provide services customized for your needs at every step of your learning journey to ensure your success.

Get timely feedback on your projects.

  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
  • 1,400+

    project reviewers

  • 2.7M

    projects reviewed

  • 88/100

    reviewer rating

  • 1.1 hours

    avg project review turnaround time

Learn with the best.

Learn with the best.

  • Ron Woerner

    Chief Security Officer

    Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.

  • Jerry Smith

    Information Security Engineer

    Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.

  • Christine Izuakor, PhD, CISSP

    Founder & CEO, Cyber Pop-up

    Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

  • Sean Pike, Esq., M.S.

    Sr. Director, Security & GRC

    Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business.

Introduction to Cybersecurity

Get started today

    • Learn

      Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.

    • Average Time

      On average, successful students take 4 months to complete this program.

    • Benefits include

      • Real-world projects from industry experts
      • Real-time classroom support
      • Career services

    Program details

    Program overview: Why should I take this program?
    • Why should I enroll?

      Cybersecurity is a critically important field for businesses in every industry, especially given the proliferation of data breaches (more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). To reduce risk and improve security, businesses are rushing to hire for cybersecurity roles, yet there's projected to be 3.5 million unfilled cybersecurity jobs by 2021. The Introduction to Cybersecurity Nanodegree program will equip you with the foundational skills to get started in this highly in-demand field.

      Graduates of this program will be able to:

      • Evaluate specific security techniques used to administer a system that meets industry standards and core controls.
      • Explain methods for establishing and maintaining the security of a network, computing environment, and application.
      • Apply control techniques to secure networks, operating systems, and applications.
      • Conduct threat assessments and vulnerability scans to secure the assets of an organization.
    • What jobs will this program prepare me for?

      While this is an introductory course that may not necessarily prepare you for a specific job, it will prepare you with the right foundation with which to pursue more specialized cybersecurity training. It also serves as a great supplement for professionals in IT, Risk Management, and Consulting to bolster their current skillset with a strong grasp of cybersecurity fundamentals.

    • How do I know if this program is right for me?

      This program is a great fit for anyone interested in building fundamental skills and knowledge in cybersecurity, such as system and network security, threat assessment, and incident response. Whether you're looking to move into a career in the field of cybersecurity, or just want to improve your own understanding of core cybersecurity skills, the Introduction to Cybersecurity Nanodegree program is for you.

    Enrollment and admission
    • Do I need to apply? What are the admission criteria?

      No. This Nanodegree program accepts all applicants regardless of experience and specific background.

    • What are the prerequisites for enrollment?

      To be best prepared to succeed in this program, students should have basic familiarity or experience with:

      • Principles of network connectivity.
      • Basic operating system fundamentals including Windows or Linux.
    • If I do not meet the requirements to enroll, what should I do?

      We recommend this Linux Command Line Basics course if you'd like to learn more about the Linux OS.

    Tuition and term of program
    • How is this Nanodegree program structured?

      The Introduction to Cybersecurity Nanodegree program is comprised of content and curriculum to support four projects. Once you subscribe to a Nanodegree program, you will have access to the content and services for the length of time specified by your subscription. We estimate that students can complete the program in four months, working 10 hours per week.

      Each project will be reviewed by the Udacity reviewer network. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.

    • How long is this Nanodegree program?

      You will have access to this Nanodegree program for as long as your subscription remains active. The estimated time to complete this program can be found on the webpage and in the syllabus, and is based on the average amount of time we project that it takes a student to complete the projects and coursework. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.

    • Can I switch my start date? Can I get a refund?

      Please see the Udacity Program FAQs for policies on enrollment in our programs.

    Software and hardware: What do I need for this program?
    • What hardware, software, and versions will I need in this program?

      For this Nanodegree program, you will need a desktop or laptop computer running recent versions of Windows, Mac OS X, or Linux and an unmetered broadband Internet connection.

    Introduction to Cybersecurity

    Enroll Now