New!
Nanodegree Program

Security Analyst

Meet the growing demand for cybersecurity professionals by gaining the skills to protect an organization’s computer networks and systems.
Enroll Now
  • DAYS
  • HRS
  • MIN
  • SEC
  • Estimated Time
    4 Months

    At 10 hours/week

  • Enroll by
    September 29, 2021

    Get access to the classroom immediately upon enrollment

  • Prerequisites
    Experience with Python, SQL, and security fundamentals

What You Will Learn

Syllabus

Security Analyst

You’ll master the skills necessary to become a successful Security Analyst. Learn to identify, correct and respond to security weaknesses and incidents. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures.

You’ll master the skills necessary to become a successful Security Analyst. Learn to identify, correct and respond to security weaknesses and incidents and get hands-on experience monitoring network traffic and following incident handling procedures.

Related Nanodegrees
Prerequisite Knowledge

Experience with Python, SQL, security fundamentals, database design, and networking and operating systems.

  • Fundamentals of Defending Systems

    In this course, you will begin your exploration into the role of a security analyst. You will learn about the core principles and philosophy that drive work in the security field. Then, you will discover physical, logical and administrative controls, their industry recognized frameworks, and how to apply them to secure a network, system or application. Lastly, you will apply security concepts to create defensible, resilient network architecture.

  • Analyzing Security Threats

    In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.

  • Assessing Vulnerabilities and Reducing Risk

    In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics and their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.

  • Monitoring, Logging and Responding to Incidents

    In this course, you will discover the importance of incident detection and use the Snort Intrusion Detection System to automatically generate alerts based on suspicious network traffic. You will learn to analyze automated alerts for false positives and determine if they represent a real security threat. You will analyze network traffic using Wireshark and capture live traffic using tcpdump. You will also use Splunk to search and correlate security log data across multiple sources. Finally, you will follow incident handling procedures to respond and recover from security incident scenarios.

Icon - Dark upwards trend arrow
Cybersecurity Analyst is one the top 20 fastest growing roles, according to The U.S. Bureau of Labor Statistics (BLS).

All Our Programs Include

Real-world projects from industry experts

Real-world projects from industry experts

With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want.
Technical mentor support

Technical mentor support

Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.
Career Services

Career services

You’ll have access to resume support, Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.
Flexible learning program

Flexible learning program

Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
Program OfferingsFull list of offerings included:
Enrollment Includes:
Class Content
Real-world projects
icon-checkmarkCheckmark
Project reviews
icon-checkmarkCheckmark
Project feedback from experienced reviewers
icon-checkmarkCheckmark
Student Services
Technical mentor support
New
icon-checkmarkCheckmark
Student community
Improved
icon-checkmarkCheckmark
Career services
Resume support
icon-checkmarkCheckmark
Github review
icon-checkmarkCheckmark
LinkedIn profile optimization
icon-checkmarkCheckmark
Succeed with Personalized Services
We provide services customized for your needs at every step of your learning journey to ensure your success!
Get timely feedback on your projects
Reviews By the numbers
1,400+ project reviewers
2.7M projects reviewed
88/100 reviewer rating
1.1 hours avg project review turnaround time
Reviewer Services
  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
Mentors available to answer your questions
Mentors by the numbers
1,400+ technical mentors
0.85 hours median response time
Mentorship Services
  • Support for all your technical questions
  • Questions answered quickly by our team of technical mentors

Security Analyst

Get Started Today

  • Monthly Access

    Pay as you go


    per

    /

    /

    Enroll Now
    • Maximum flexibility to learn at your own pace.
    • Cancel anytime.
  • - access

    Pay upfront and save an extra 0%


    for - access

    Enroll Now
    • Save an extra 0% vs. pay as you go.
    • 4 months is the average time to complete this course.
    • Switch to monthly price after if more time is needed.
    • Cancel anytime.
    Best Value
  • Learn

    Learn to identify, correct and respond to security weaknesses and incidents, monitor network traffic, analyze alert and log data, and follow incident handling procedures.
  • Average Time

    On average, successful students take 4 months to complete this program.
  • Benefits include

    • Real-world projects from industry experts
    • Technical mentor support
    • Career services

Program Details

PROGRAM OVERVIEW - WHY SHOULD I TAKE THIS PROGRAM?
  • Why should I enroll?
    The global cybersecurity market is currently worth $173B in 2020, growing to $270B by 2026. The Security Analyst Nanodegree program was designed to help you take advantage of the growing need for skilled information security analysts. Prepare to meet the demand for cybersecurity professionals who are trained to play a critical role in protecting an organization’s computer networks and systems.
  • What jobs will this program prepare me for?
    The need for a strong computer security culture in an enterprise organization is greater than ever. The skills you will gain from this Nanodegree program will qualify you for cyber security jobs in several industries as countless companies are boosting security protocol.
  • How do I know if this program is right for me?
    The course is for developers who already use SQL and Python and have a basic understanding of network infrastructure, but want to advance their career and land a high-paying IT security job.
ENROLLMENT AND ADMISSION
  • Do I need to apply? What are the admission criteria?
    No. This Nanodegree program accepts all applicants regardless of experience and specific background.
  • What are the prerequisites for enrollment?

    A well-prepared student should:


    • Be able to use Python as scripting language and SQL in order to run queries from Log data.
    • Be familiar with security fundamentals including core security principles, critical security controls and best practices for securing information.
    • Be knowledgeable in database design, large database systems, networking and operating systems.
    • Have experience using Unix or Linux command line
    • Have a basic understanding of client-server architecture
    • Have familiarity with reading and creating simple network architecture diagrams
  • If I do not meet the requirements to enroll, what should I do?
    Students who do not feel comfortable in the above may consider taking Udacity’s Introduction to Cybersecurity course to obtain prerequisite skills.
TUITION AND TERM OF PROGRAM
  • How is this Nanodegree program structured?
    The Security Analyst Nanodegree program is comprised of content and curriculum to support five (4) projects. We estimate that students can complete the program in four (4) months, working 10 hours per week.

    Each project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes
  • How long is this Nanodegree program?
    Access to this Nanodegree program runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.
  • Can I switch my start date? Can I get a refund?
    Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
SOFTWARE AND HARDWARE - WHAT DO I NEED FOR THIS PROGRAM?
  • What software and versions will I need in this program?
    There are no software and version requirements to complete this Nanodegree program. All coursework and projects can be completed via Student Workspaces in the Udacity online classroom.

Security Analyst

Enroll Now