Skip to content

Security Architect

Nanodegree Program

Meet the growing demand for security architects and learn the skills required to advance your cybersecurity career.

Enroll Now
  • Estimated time
    4 Months

    At 10 hours/week

  • Enroll by
    June 7, 2023

    Get access to the classroom immediately upon enrollment

  • Skills acquired
    Access Control Matrices, Architecture Diagramming, Threat Modeling

What you will learn

  1. Security Architect

    Estimated 4 months to complete

    You’ll master the skills necessary to become a successful security architect. Learn core strategies and implementation elements of security infrastructure design and management at an enterprise level.

    Prerequisite knowledge

    Linux and AWS.

    1. Security Architecture Planning & Design

      This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.

    2. Enterprise Identity and Access Control

      Identity and access control management is fundamental to the security of any organization. This course introduces the fundamentals needed to create and implement access control within an organization. Specifically, this course teaches the fundamentals of managing access control within cloud environments such as AWS. Students who complete this course will be equipped with the skills to design, implement, and enforce access control using different access control models. In doing so, they will be prepared to implement access control that is maintainable and aligns with the principle of least privilege.

    3. Infrastructure & Network Security Architecture Planning & Design

      This course covers infrastructure and network security concepts essential for designing and implementing secure infrastructure. Complex infrastructures can have multiple moving components connected over a network. A multi-layered security architecture is required to provide complete visibility of system and service behavior. This course covers aspects of architecting and building security alerting and monitoring services that are scalable throughout the enterprise.

    4. Incident Response & Business Continuity Architecture Planning, Design & Implementation

      This course introduces the fundamental incident response planning, design, and architecture concepts that are used in the cloud. As cloud solutions grow more complex so must the related incident response capabilities. Students who complete this course will be equipped with the skills to plan, design and execute a strong set of foundational cloud incident response capabilities.

All our programs include

  • Real-world projects from industry experts

    With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

  • Real-time support

    On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.

  • Career services

    You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.

  • Flexible learning program

    Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

Program offerings

  • Class content

    • Real-world projects
    • Project reviews
    • Project feedback from experienced reviewers
  • Student services

    • Student community
    • Real-time support
  • Career services

    • Github review
    • LinkedIn profile optimization

Succeed with personalized services.

We provide services customized for your needs at every step of your learning journey to ensure your success.

Get timely feedback on your projects.

  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
  • 1,400+

    project reviewers

  • 2.7M

    projects reviewed

  • 88/100

    reviewer rating

  • 1.1 hours

    avg project review turnaround time

Learn with the best.

Learn with the best.

  • Erick Galinkin

    Principal AI Researcher | Rapid7

    Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.

  • Sjon-Paul Brown

    Senior DevOps Engineer

    Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.

  • Abhinav Singh

    Cybersecurity Researcher

    Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.

  • William O. Ferguson

    Cloud Architect

    William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.

Security Architect

Get started today

    • Learn

      Architectural and implementation skills critical for identity and access management, infrastructure security, threat detection, and incident response.

    • Average Time

      On average, successful students take 4 months to complete this program.

    • Benefits include

      • Real-world projects from industry experts
      • Real-time classroom support
      • Career services

    Program details

    Program overview: Why should I take this program?
    • Why should I enroll?

      This program is designed to help you take advantage of the growing need for skilled cybersecurity professionals. Prepare to meet the demand for qualified security analysts that can implement elements of security infrastructure design and management at an enterprise level.

    • What jobs will this program prepare me for?

      The need for a strong cybersecurity culture in an enterprise organization is greater than ever. The skills you will gain from this Nanodegree program will qualify you for jobs in several industries as countless companies are trying to keep up with security threats.

    • How do I know if this program is right for me?

      The course is for individuals who are looking to advance their cybersecurity careers with cutting-edge skills to protect enterprises from threats.

    Enrollment and admission
    • Do I need to apply? What are the admission criteria?

      No. This Nanodegree program accepts all applicants regardless of experience and specific background.

    • What are the prerequisites for enrollment?

      A well prepared student will be familiar with Linux and AWS and have some experience conducting administration with those platforms. Specifically, students should be able to:

      • Set up a Linux server and perform system configuration/management
      • Set up a cloud environment and perform cloud configuration/management
      • Understand networking, cloud, and hardware systems relevant to courses being taught (e.g. if a course teaches on Linux security, students should know the basics of how Linux works) including: Experience with networking, cloud, and Linux systems, experience with common networking protocols (HTTP, TCP, DNS, SSH) and familiarity with client-server architecture
      • Identify the different encryption protocols (AES, RSA, PGP)
      • Review, implement, and modify code using Python
      • Accurately use general cybersecurity terminology to describe threats (e.g. Exploit, Vulnerability, Malware)
    • If I do not meet the requirements to enroll, what should I do?

      Students who do not feel comfortable in the above may consider taking Udacity’s Introduction to Cybersecurity Nanodegree program to obtain prerequisite skills.

    Tuition and term of program
    • How is this Nanodegree program structured?

      The Security Architect Nanodegree program is comprised of content and curriculum to support four (4) projects. We estimate that students can complete the program in four (4) months, working 10 hours per week.

      Each project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes

    • How long is this Nanodegree program?

      Access to this Nanodegree program runs for the length of time specified above. If you do not graduate within that time period, you will continue learning with month-to-month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.

    • Can I switch my start date? Can I get a refund?

      Please see the Udacity Program FAQs for policies on enrollment in our programs.

    Software and hardware: What do I need for this program?
    • What software versions will I need in this program?

      There are no software and version requirements to complete this Nanodegree program. All coursework and projects can be completed via Student Workspaces in the Udacity online classroom.

    Security Architect

    Enroll Now