Lesson 1
An Introduction to Your Security Architect Nanodegree Program
Welcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.
Nanodegree Program
The goal of the Security Architect Nanodegree is to equip learners with the necessary skills required to advance their careers in the field of cybersecurity. As a security architect, you'll be charged with designing security systems to thwart malware, hacker intrusions and Denial of Service attacks. The program addresses security topics related to architectural and implementation skills required by a skilled cybersecurity professional for critical use-cases like identity & access management, infrastructure security, threat detection and incident response.
The goal of the Security Architect Nanodegree is to equip learners with the necessary skills required to advance their careers in the field of cybersecurity. As a security architect, you'll be charged with designing security systems to thwart malware, hacker intrusions and Denial of Service attacks. The program addresses security topics related to architectural and implementation skills required by a skilled cybersecurity professional for critical use-cases like identity & access management, infrastructure security, threat detection and incident response.
Intermediate
4 months
Real-world Projects
Completion Certificate
Last Updated June 18, 2024
Skills you'll learn:
Prerequisites:
Course 1 • 45 minutes
This is the introduction the the
Lesson 1
Welcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.
Lesson 2
You are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.
Course 2 • 4 weeks
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
Lesson 1
In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Lesson 2
Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.
Lesson 3
Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.
Lesson 4 • Project
Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.
Course 3 • 4 weeks
This course focuses on identity and access management. As a security architect, implementing an organization-wide strategy for strong Identity and access management can greatly improve the security posture of the organization. IAM can be tricky to architect and implement. Too much access can lead to data exposure, whereas, too little access can lead to business hindrance. A fine balance is required while designing a strong IAM model. We will be covering some of those concepts and methodologies in this course.
Lesson 1
In this introductory lesson, we meet the course instructor and discuss enterprise identity and access control from a high-level perspective.
Lesson 2
In this lesson, we discuss two access control methodologies in detail, RBAC and ABAC. We also create IAM Roles and review IAM policies in AWS.
Lesson 3
In this lesson, we discuss mapping permissions using an access control matrix design based on access control requirements.
Lesson 4
In this lesson, we take a deep dive into evaluating IAM policies, creating IAM restrictions, and validating permissions in AWS.
Lesson 5
In this lesson, we focus on building an IAM architecture diagram that visualizes and defines the organizational structure of users, permissions, and resources.
Lesson 6
In this lesson, we wrap up the course by focusing on monitoring policy compliance, enforcing IAM policy configurations, and policy remediation in AWS.
Lesson 7 • Project
In this project, you will implement and enforce identity access management within AWS by implementing a role structure with policies that will be evaluated and enforced.
Course 4 • 4 weeks
In this course, you'll learn how to plan and build the architecture to ensure that your organization's security is up to date and well defended.
Lesson 1
This is the introduction lesson to this course.
Lesson 2
In this lesson, you'll learn about planning the design for your Infrastructure and Network Security.
Lesson 3
In this lesson, you'll put your security plan into practice with intelligence-driven, Defense-in-Depth best practices.
Lesson 4
In this lesson, you'll ensure that your security plan is scalable and that you have taken the threat surface into account properly.
Lesson 5
In this lesson, you'll further build on your threat architecture to quickly detect and triage threats.
Lesson 6 • Project
This is the project lesson for the Infrastructure & Network Security Architecture Planning & Design course.
Principal AI Researcher
Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.
Cloud Architect
William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.
Cybersecurity Researcher
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
Senior DevOps Engineer
Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.
Average Rating: 4.6 Stars
9 Reviews
Raj Mohan M.
May 22, 2022
ITs fantastic- give a practical approach. But keep it in mind not all the users do have background on database and stuff. hence good to have similar project work as an example which could have given me the confidence to take the first project.
Mauro Antonio L.
April 18, 2022
Everything great with the projects, they are challenging.
Anonymous
April 12, 2022
Amazing
Mohamed A.
December 20, 2021
Thank you, this project is so useful
Jai Kishore V.
November 27, 2021
Great, full of new experiential learning
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
(32)
4 months
, Intermediate
(27)
4 months
, Intermediate
(115)
3 months
, Beginner
(17)
2 months
, Advanced
4 weeks
, Intermediate
(4)
3 months
, Advanced
4 weeks
, Intermediate
(47)
4 months
, Intermediate
(1)
4 months
, Beginner
4 weeks
, Beginner
(6)
4 weeks
, Beginner
4 weeks
, Intermediate
(80)
4 months
, Advanced
4 weeks
, Intermediate
(174)
2 months
, Advanced
4 weeks
, Intermediate
Security Architect
(32)
4 months
, Intermediate
(27)
4 months
, Intermediate
(115)
3 months
, Beginner
(17)
2 months
, Advanced
4 weeks
, Intermediate
(4)
3 months
, Advanced
4 weeks
, Intermediate
(47)
4 months
, Intermediate
(1)
4 months
, Beginner
4 weeks
, Beginner
(6)
4 weeks
, Beginner
4 weeks
, Intermediate
(80)
4 months
, Advanced
4 weeks
, Intermediate
(174)
2 months
, Advanced
4 weeks
, Intermediate