NEW!
Nanodegree Program

Introduction to Cybersecurity

Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.
Enroll Now
  • Estimated Time
    4 months

    At 10 hours/week

  • Enroll by
     

    Get access to the classroom immediately on enrollment

  • Prerequisites
    Basic knowledge of network connectivity and OS fundamentals

    See prerequisites in detail

In Collaboration With:

  • SecurityScorecard

What You Will Learn

SYLLABUS

Introduction to Cybersecurity

Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

Udacity has teamed up with the best in the field to teach you the basics of security and get you on your way towards an exciting career in the high-growth field of Cybersecurity.

Hide details

4 months to complete

Prerequisite Knowledge

Basic knowledge of network connectivity and OS fundamentals See detailed requirements.

  • Cybersecurity Foundations

    This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

    Securing a Business Network
  • Defending and Securing Systems

    Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

    Monitoring and Securing Douglas Financials Inc.
  • Threats, Vulnerabilities, and Incident Response

    During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.

    Navigating a Cybersecurity Incident
  • Governance, Risk, and Compliance

    Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.

    Create the SwiftTech GRC Program
Icon - Dark upwards trend arrow
There will be an estimated 3.5 million unfilled cybersecurity jobs globally by 2021.

All Our Programs Include

Real-world projects from industry experts

Real-world projects from industry experts

With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want.
Technical mentor support

Technical mentor support

Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.
Personal career coach and career services

Personal career coach and career services

You’ll have access to career coaching sessions, interview prep advice, and resume and online professional profile reviews to help you grow in your career.
Flexible learning program

Flexible learning program

Get a custom learning plan tailored to fit your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
Program OfferingsFull list of offerings included:
Enrollment includes:
Class Content
Real-world projects
icon-checkmarkCheckmark
Project reviews
icon-checkmarkCheckmark
Project feedback from experienced reviewers
icon-checkmarkCheckmark
Student Services
Technical mentor support
New
icon-checkmarkCheckmark
Student community
Improved
icon-checkmarkCheckmark
Career services
Personal career coaching
New
icon-checkmarkCheckmark
Interview preparations
icon-checkmarkCheckmark
Resume services
icon-checkmarkCheckmark
Github review
icon-checkmarkCheckmark
LinkedIn profile review
icon-checkmarkCheckmark
Succeed with Personalized Services
We provide services customized for your needs at every step of your learning journey to ensure your success!
Experienced Project Reviewers
Project Reviewers
Technical Mentor Support
Technical Mentor Support
Personal Career Coach
Career Coaching
Get personalized feedback on your projects
Reviews By the numbers
2000+ project reviewers
1.8M projects reviewed
4.85/5 reviewer ratings
3 hour avg project review turnaround time
Reviewer Services
  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve

Learn with the best

Ron Woerner, CISSP, CISM
Ron Woerner, CISSP, CISM

Chief Security Officer

Ron Woerner is a noted consultant, speaker and writer in the security industry. As Chief Security Evangelist at Cyber-AAA, LLC, he delivers training and security risk assessments for small, medium, and large organizations. Ron also teaches at Bellevue University, an NSA Center of Academic Excellence.

Jerry Smith
Jerry Smith

Information Security Engineer

Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.

Christine Izuakor, PhD, CISSP
Christine Izuakor, PhD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

Sean Pike, Esq., M.S.
Sean Pike, Esq., M.S.

Sr. Director, Security & GRC

Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business.

Get started with

Introduction to Cybersecurity

Icon-Book-blue
Learn
Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.
Icon - Clock -Blue
Average Time
On average, successful students take null months to complete this program.
Icon - Project - Blue
Benefits include
  • Real-world projects from industry experts
  • Technical mentor support
  • Personal career coach & career services
blue stacked bills
STAY SHARP WHILE STAYING IN
  • Financial support available worldwide to help in this challenging time
  • Spend your time at home learning new, higher-paying job skills
  • Commit to a brighter future by learning today
Get Financial Support

Impacted by COVID-19? We're offering deeper discounts. Apply and see how much.

Get your discount

10% OFF

null months access
  per month

Start learning today! Switch to the monthly price afterwards if more time is needed.

Pay as you go
 per month

Start Learning Today! Get maximum flexibility to learn at your own pace.

PROGRAM OVERVIEW - WHY SHOULD I TAKE THIS PROGRAM?
  • Why should I enroll?
    Cybersecurity is a critically important field for businesses in every industry, especially given the proliferation of data breaches (more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). To reduce risk and improve security, businesses are rushing to hire for cybersecurity roles, yet there's projected to be 3.5 million unfilled cybersecurity jobs by 2021. The Introduction to Cybersecurity Nanodegree program will equip you with the foundational skills to get started in this highly in-demand field.

    Graduates of this program will be able to:
    • Evaluate specific security techniques used to administer a system that meets industry standards and core controls.
    • Explain methods for establishing and maintaining the security of a network, computing environment, and application.
    • Apply control techniques to secure networks, operating systems, and applications.
    • Conduct threat assessments and vulnerability scans to secure the assets of an organization.
  • What jobs will this program prepare me for?
    While this is an introductory course that may not necessarily prepare you for a specific job, it will prepare you with the right foundation with which to pursue more specialized cybersecurity training. It also serves as a great supplement for professionals in IT, Risk Management, and Consulting to bolster their current skillset with a strong grasp of cybersecurity fundamentals.
  • How do I know if this program is right for me?
    This program is a great fit for anyone interested in building fundamental skills and knowledge in cybersecurity, such as system and network security, threat assessment, and incident response. Whether you're looking to move into a career in the field of cybersecurity, or just want to improve your own understanding of core cybersecurity skills, the Introduction to Cybersecurity Nanodegree program is for you.
ENROLLMENT AND ADMISSION
  • Do I need to apply? What are the admission criteria?
    No. This Nanodegree program accepts all applicants regardless of experience and specific background.
  • What are the prerequisites for enrollment?
    To be best prepared to succeed in this program, students should have basic familiarity or experience with:
    • Principles of network connectivity.
    • Basic operating system fundamentals including Windows or Linux.
  • If I do not meet the requirements to enroll, what should I do?
    We recommend this Linux Command Line Basics course if you'd like to learn more about the Linux OS.
TUITION AND TERM OF PROGRAM
  • How is this Nanodegree program structured?
    The Introduction to Cybersecurity Nanodegree program is comprised of content and curriculum to support four projects. Once you subscribe to a Nanodegree program, you will have access to the content and services for the length of time specified by your subscription. We estimate that students can complete the program in four months, working 10 hours per week.

    Each project will be reviewed by the Udacity reviewer network. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.
  • How long is this Nanodegree program?
    Access to this Nanodegree program runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.
  • Can I switch my start date? Can I get a refund?
    Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
SOFTWARE AND HARDWARE - WHAT DO I NEED FOR THIS PROGRAM?
  • What hardware, software, and versions will I need in this program?
    For this Nanodegree program, you will need a desktop or laptop computer running recent versions of Windows, Mac OS X, or Linux and an unmetered broadband Internet connection.