Udacity Logo
Log InJoin for Free

Introduction to Cybersecurity

Nanodegree Program

In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

Beginner

3 months

Real-world Projects

Completion Certificate

Last Updated February 21, 2024

Skills you'll learn:
Threat intelligence • Cryptography • Cybersecurity fluency • Security auditing
Prerequisites:
Operating system fundamentals • Command line interface basics

Courses In This Program

Course 1 50 minutes

Welcome to the Nanodegree Program

Course 2 3 weeks

Cybersecurity Foundations

Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

Course 3 4 weeks

Threats, Vulnerabilities, and Incident Response

Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.

Course 4 3 weeks

Defending and Securing Systems

In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

Taught By The Best

Photo of Ron Woerner

Ron Woerner

Chief Security Officer

Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.

Photo of Christine Izuakor, PhD, CISSP

Christine Izuakor, PhD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

Photo of Sean Pike, Esq., M.S.

Sean Pike, Esq., M.S.

Sr. Director, Security & GRC

Sean Pike is a Cybersecurity and GRC leader with 20+ years of experience leading cybersecurity initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive security solutions that follow stringent security principles while accelerating business.

Photo of Jerry Smith

Jerry Smith

Information Security Engineer

Jerry is a member of the Security Operations Center for the University of Alabama Birmingham, where he is the lead Threat Hunter and a member of the firewall team. Previously he was an Information Security Engineer for Hibbett Sporting Goods.

Ratings & Reviews

Average Rating: 4.5 Stars

(115 Reviews)

Page 1 of 23

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills