Skip to content

Security Architect

Nanodegree Program

Meet the growing demand for security architects and learn the skills required to advance your cybersecurity career.

Enroll Now

04Days06Hrs56Min22Sec

  • Estimated time
    4 Months

    At 10 hours/week

  • Enroll by
    September 28, 2022

    Get access to the classroom immediately upon enrollment

  • Prerequisites
    Linux and AWS

What you will learn

  1. Security Architect

    Estimated 4 months to complete

    You’ll master the skills necessary to become a successful security architect. Learn core strategies and implementation elements of security infrastructure design and management at an enterprise level.

    Prerequisite knowledge

    1. Security Architecture Planning & Design

      This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.

    2. Enterprise Identity and Access Control

      Identity and access control management is fundamental to the security of any organization. This course introduces the fundamentals needed to create and implement access control within an organization. Specifically, this course teaches the fundamentals of managing access control within cloud environments such as AWS. Students who complete this course will be equipped with the skills to design, implement, and enforce access control using different access control models. In doing so, they will be prepared to implement access control that is maintainable and aligns with the principle of least privilege.

    3. Infrastructure & Network Security Architecture Planning & Design

      This course covers infrastructure and network security concepts essential for designing and implementing secure infrastructure. Complex infrastructures can have multiple moving components connected over a network. A multi-layered security architecture is required to provide complete visibility of system and service behavior. This course covers aspects of architecting and building security alerting and monitoring services that are scalable throughout the enterprise.

    4. Incident Response & Business Continuity Architecture Planning, Design & Implementation

      This course introduces the fundamental incident response planning, design, and architecture concepts that are used in the cloud. As cloud solutions grow more complex so must the related incident response capabilities. Students who complete this course will be equipped with the skills to plan, design and execute a strong set of foundational cloud incident response capabilities.

All our programs include:

  • Real-world projects from industry experts

    With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

  • Technical mentor support

    Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.

  • Career services

    You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.

  • Flexible learning program

    Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

Program offerings

  • Class content

    • Real-world projects
    • Project reviews
    • Project feedback from experienced reviewers
  • Student services

    • Technical mentor support
    • Student community
  • Career services

    • Github review
    • LinkedIn profile optimization

Succeed with personalized services.

We provide services customized for your needs at every step of your learning journey to ensure your success.

Get timely feedback on your projects.

  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
  • 1,400+

    project reviewers

  • 2.7M

    projects reviewed

  • 88/100

    reviewer rating

  • 1.1 hours

    avg project review turnaround time

Mentors available to answer your questions.

  • Support for all your technical questions
  • Questions answered quickly by our team of technical mentors
  • 1,400+

    technical mentors

  • 0.85 hours

    median response time

Learn with the best.

Learn with the best.

  • Erick Galinkin

    Principal AI Researcher | Rapid7

    Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.

  • Sjon-Paul Brown

    Senior DevOps Engineer

    Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.

  • Abhinav Singh

    Cybersecurity Researcher

    Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.

  • William O. Ferguson

    Cloud Architect

    William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.

Security Architect

Get started today

  • Monthly access

    Pay as you go


    per

    /

    /

    Enroll now
    • Maximum flexibility to learn at your own pace.
    • Cancel anytime.
  • - access

    Pay upfront and save an extra 0%


    for - access

    Enroll now
    • Save an extra 0% vs. pay as you go.
    • 4 months is the average time to complete this course.
    • Switch to monthly price after if more time is needed.
    • Cancel anytime.
    Best Value
  • Learn

    Architectural and implementation skills critical for identity and access management, infrastructure security, threat detection, and incident response.
  • Average Time

    On average, successful students take 4 months to complete this program.
  • Benefits include

    • Real-world projects from industry experts
    • Technical mentor support
    • Career services

Program details

Program overview: Why should I take this program?
  • Why should I enroll?
  • What jobs will this program prepare me for?
  • How do I know if this program is right for me?
Enrollment and admission
  • Do I need to apply? What are the admission criteria?
  • What are the prerequisites for enrollment?
  • If I do not meet the requirements to enroll, what should I do?
Tuition and term of program
  • How is this Nanodegree program structured?
  • How long is this Nanodegree program?
  • Can I switch my start date? Can I get a refund?
Software and hardware: What do I need for this program?
  • What software versions will I need in this program?

Security Architect

Enroll Now