Lesson 1
Security Analyst Nanodegree Experience
Welcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.
Nanodegree Program
The goal of the Security Analyst Nanodegree Program is to equip students with the skills required to be successful in an analyst role.
The goal of the Security Analyst Nanodegree Program is to equip students with the skills required to be successful in an analyst role.
Intermediate
3 months
Real-world Projects
Completion Certificate
Last Updated May 12, 2023
Skills you'll learn:
Prerequisites:
Course 1 • 45 minutes
Lesson 1
Welcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.
Lesson 2
You are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.
Course 2 • 3 weeks
In this course, you will begin your exploration into the role of a security analyst. You will learn about the core principles and philosophies that drive work in the security field. Then, you will discover physical, logical, and administrative controls, their industry-recognized frameworks, and how to apply them to secure a network, system, or application. Lastly, you will apply security concepts to create defensible, resilient network architecture.
Lesson 1
This lesson is an introduction to the Security Analyst role and how that role fits into an organization.
Lesson 2
This lesson provides the underlying philosophy and objectives for your work as an Analyst. Through real examples, you'll explore a variety of attack vectors and threat modeling strategies.
Lesson 3
This lesson is a broad survey of the families of security controls and provides opportunities to work with some of the technical mechanisms used to prevent security challenges.
Lesson 4
This lesson focuses on improving your organization's posture by applying control concepts to design infrastructure that is more resistant to intrusion.
Lesson 5 • Project
For your final project, you will assume the role of an Information Security Analyst for an industrial manufacturing company located in the Midwest Unites States.
Course 3 • 2 weeks
In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.
Lesson 1
In this lesson, you'll be introduced to what you'll be learning about in this course!
Lesson 2
In this lesson, you will learn about internal threats, external threats, and the OWASP Top 10.
Lesson 3
In this lesson, you will learn different mitigation strategies and the threats they mitigate.
Lesson 4
In this lesson, you will use your new skills to create Threat Models for different threat scenarios.
Lesson 5 • Project
In this lesson, you will work with a large company to assess threats and suggest mitigations.
Course 4 • 4 weeks
In this course, you will learn how security analysts address system vulnerabilities in order to reduce organizational risk. You will first learn about vulnerabilities, their characteristics, as well as their dynamic lifecycle. You will then explore the ways analysts assess vulnerabilities, including reviewing and administering scanning tools and utilities. You will learn how to measure the risks associated with discovered vulnerabilities. Lastly, you will review ways to communicate risk in order to plan remediation and mitigation activities.
Lesson 1
Get your first look at vulnerability assessment and where you’ll go throughout this course.
Lesson 2
Dive deeper into what vulnerabilities are, common types, and their relation to risk.
Lesson 3
Learn how to perform vulnerability assessments and some of the tools to do so.
Lesson 4
Determining the risks and impact to the business of the identified vulnerabilities, as well as considering how to mitigate them.
Lesson 5
Finalize your vulnerability assessment with targeted summaries by audience and strategic guidance.
Lesson 6 • Project
Dive back into Juice Shop, this time to assess vulnerabilities and reduce risks related to the insecure application.
INFORMATION SECURITY ANALYST
Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.
SECURITY ANALYST III
Chris is a Security Analyst at the University of Minnesota and an Adjunct Instructor at Dunwoody College, specializing in network security, web application security and Linux operating system security. He has a Master's Degree of Computer and Information Technology from the University of Pennsylvania.
SECURITY ENGINEER
Milind Adari is a Security Engineer at The Associated Press and an Adjunct Instructor at Columbia University. He is responsible for protecting journalists all around the world from malicious threat actors and state-sponsored attacks, all the while educating students and professionals in cybersecurity.
Average Rating: 4.8 Stars
27 Reviews
Jorge A. V.
November 17, 2022
yes it has, it has challenged me so much!
Marwa E.
September 18, 2022
Great Program
Joshua Ivan M.
July 13, 2022
This program along with the other cybersecurity nanodegrees help us understand and gain knowledge about securing systems, standards, frameworks, etc. with real-world applications, which will help us in the long-run as we progress towards the cybersecurity career path.
Fredrik S.
May 4, 2022
The course was more qualitative and less quantitative than expected.
Floyd K.
March 6, 2022
Yes it has. It is very challenging but at the same time, eye opening.
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
(32)
4 months
, Intermediate
(9)
3 months
, Intermediate
(115)
3 months
, Beginner
(17)
2 months
, Advanced
1 month
, Intermediate
(7)
1 week
, Beginner
2 weeks
, Intermediate
(1)
3 months
, Intermediate
4 weeks
, Intermediate
3 weeks
, Beginner
3 weeks
, Intermediate
4 weeks
, Intermediate
4 weeks
, Intermediate
2 weeks
, Intermediate
(94)
2 months
, Intermediate
4 weeks
, Beginner