Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Meet the growing demand for security architects and learn the skills required to advance your cybersecurity career.
At 10 hours/week
Get access to the classroom immediately upon enrollment
You’ll master the skills necessary to become a successful security architect. Learn core strategies and implementation elements of security infrastructure design and management at an enterprise level.
Linux and AWS.
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
Identity and access control management is fundamental to the security of any organization. This course introduces the fundamentals needed to create and implement access control within an organization. Specifically, this course teaches the fundamentals of managing access control within cloud environments such as AWS. Students who complete this course will be equipped with the skills to design, implement, and enforce access control using different access control models. In doing so, they will be prepared to implement access control that is maintainable and aligns with the principle of least privilege.
This course covers infrastructure and network security concepts essential for designing and implementing secure infrastructure. Complex infrastructures can have multiple moving components connected over a network. A multi-layered security architecture is required to provide complete visibility of system and service behavior. This course covers aspects of architecting and building security alerting and monitoring services that are scalable throughout the enterprise.
This course introduces the fundamental incident response planning, design, and architecture concepts that are used in the cloud. As cloud solutions grow more complex so must the related incident response capabilities. Students who complete this course will be equipped with the skills to plan, design and execute a strong set of foundational cloud incident response capabilities.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.
You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.
Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.
Architectural and implementation skills critical for identity and access management, infrastructure security, threat detection, and incident response.
On average, successful students take 4 months to complete this program.
This program is designed to help you take advantage of the growing need for skilled cybersecurity professionals. Prepare to meet the demand for qualified security analysts that can implement elements of security infrastructure design and management at an enterprise level.
The need for a strong cybersecurity culture in an enterprise organization is greater than ever. The skills you will gain from this Nanodegree program will qualify you for jobs in several industries as countless companies are trying to keep up with security threats.
The course is for individuals who are looking to advance their cybersecurity careers with cutting-edge skills to protect enterprises from threats.
No. This Nanodegree program accepts all applicants regardless of experience and specific background.
A well prepared student will be familiar with Linux and AWS and have some experience conducting administration with those platforms. Specifically, students should be able to:
Students who do not feel comfortable in the above may consider taking Udacity’s Introduction to Cybersecurity Nanodegree program to obtain prerequisite skills.
The Security Architect Nanodegree program is comprised of content and curriculum to support four (4) projects. We estimate that students can complete the program in four (4) months, working 10 hours per week.
Each project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes
Access to this Nanodegree program runs for the length of time specified above. If you do not graduate within that time period, you will continue learning with month-to-month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.
Please see the Udacity Program FAQs for policies on enrollment in our programs.
There are no software and version requirements to complete this Nanodegree program. All coursework and projects can be completed via Student Workspaces in the Udacity online classroom.