Skip to content

Introduction to Cybersecurity

Nanodegree Program

Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.

Enroll Now

06Days04Hrs31Min38Sec

  • Estimated time
    4 months

    At 10 hours/week

  • Enroll by
    October 12, 2022

    Get access to the classroom immediately on enrollment

  • Prerequisites
    Basic knowledge of network connectivity and OS fundamentals
In collaboration with:
  • SecurityScorecard

What you will learn

  1. Introduction to Cybersecurity

    4 months to complete

    Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

    Prerequisite knowledge

    1. Cybersecurity Foundations

      This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

    2. Defending and Securing Systems

      Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

    3. Threats, Vulnerabilities, and Incident Response

      During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.

    4. Governance, Risk, and Compliance

      Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.

All our programs include:

  • Real-world projects from industry experts

    With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

  • Technical mentor support

    Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.

  • Career services

    You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.

  • Flexible learning program

    Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

Program offerings

  • Class content

    • Real-world projects
    • Project reviews
    • Project feedback from experienced reviewers
  • Student services

    • Technical mentor support
    • Student community
  • Career services

    • Github review
    • Linkedin profile optimization

Succeed with personalized services.

We provide services customized for your needs at every step of your learning journey to ensure your success.

Get timely feedback on your projects.

  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
  • 1,400+

    project reviewers

  • 2.7M

    projects reviewed

  • 88/100

    reviewer rating

  • 1.1 hours

    avg project review turnaround time

Mentors available to answer your questions.

  • Support for all your technical questions
  • Questions answered quickly by our team of technical mentors
  • 1,400+

    technical mentors

  • 0.85 hours

    median response time

Learn with the best.

Learn with the best.

  • Ron Woerner

    Chief Security Officer

    Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.

  • Jerry Smith

    Information Security Engineer

    Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.

  • Christine Izuakor, PhD, CISSP

    Founder & CEO, Cyber Pop-up

    Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

  • Sean Pike, Esq., M.S.

    Sr. Director, Security & GRC

    Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business.

Introduction to Cybersecurity

Get started today

  • Monthly access

    Pay as you go


    per

    /

    /

    Enroll now
    • Maximum flexibility to learn at your own pace.
    • Cancel anytime.
  • - access

    Pay upfront and save an extra 0%


    for - access

    Enroll now
    • Save an extra 0% vs. pay as you go.
    • 4 months is the average time to complete this course.
    • Switch to monthly price after if more time is needed.
    • Cancel anytime.
    Best Value
  • Learn

  • Average Time

  • Benefits include

Program details

Program overview: Why should I take this program?
  • Why should I enroll?
  • What jobs will this program prepare me for?
  • How do I know if this program is right for me?
Enrollment and admission
  • Do I need to apply? What are the admission criteria?
  • What are the prerequisites for enrollment?
  • If I do not meet the requirements to enroll, what should I do?
Tuition and term of program
  • How is this Nanodegree program structured?
  • How long is this Nanodegree program?
  • Can I switch my start date? Can I get a refund?
Software and hardware: What do I need for this program?
  • What hardware, software, and versions will I need in this program?

Introduction to Cybersecurity

Enroll Now