Udacity part of Accenture logo
Log InJoin for Free

Security Architect

Nanodegree Program

The goal of the Security Architect Nanodegree is to equip learners with the necessary skills required to advance their careers in the field of cybersecurity. As a security architect, you'll be charged with designing security systems to thwart malware, hacker intrusions and Denial of Service attacks. The program addresses security topics related to architectural and implementation skills required by a skilled cybersecurity professional for critical use-cases like identity & access management, infrastructure security, threat detection and incident response.

The goal of the Security Architect Nanodegree is to equip learners with the necessary skills required to advance their careers in the field of cybersecurity. As a security architect, you'll be charged with designing security systems to thwart malware, hacker intrusions and Denial of Service attacks. The program addresses security topics related to architectural and implementation skills required by a skilled cybersecurity professional for critical use-cases like identity & access management, infrastructure security, threat detection and incident response.

Intermediate

4 months

Real-world Projects

Completion Certificate

Last Updated June 18, 2024

Skills you'll learn:

Access control matrices • Network security fundamentals • Cybersecurity business context • Did framework

Prerequisites:

IT architecture diagramming • Systems administration proficiency • Cloud computing fluency

Courses In This Program

Course 1 45 minutes

Welcome to the Security Architect Nanodegree Program

This is the introduction the the

Lesson 1

An Introduction to Your Security Architect Nanodegree Program

Welcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.

Lesson 2

Getting Help

You are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.

Course 2 4 weeks

Security Architecture Planning and Design

This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.

Lesson 1

Introduction to Security Planning and Design

In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.

Lesson 2

Security and Regulatory Frameworks

Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.

Lesson 3

Designing Secure Systems

Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.

Lesson 4 • Project

Conduct an Application Security Review

Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.

Course 3 4 weeks

Enterprise Identity and Access Control

This course focuses on identity and access management. As a security architect, implementing an organization-wide strategy for strong Identity and access management can greatly improve the security posture of the organization. IAM can be tricky to architect and implement. Too much access can lead to data exposure, whereas, too little access can lead to business hindrance. A fine balance is required while designing a strong IAM model. We will be covering some of those concepts and methodologies in this course.

Lesson 1

Introduction to Enterprise Identity and Access Control

In this introductory lesson, we meet the course instructor and discuss enterprise identity and access control from a high-level perspective.

Lesson 2

IAM Access Control Models and AWS

In this lesson, we discuss two access control methodologies in detail, RBAC and ABAC. We also create IAM Roles and review IAM policies in AWS.

Lesson 3

Building Access Control Matrix and Mapping Permissions

In this lesson, we discuss mapping permissions using an access control matrix design based on access control requirements.

Lesson 4

Building Organizational Role Structure

In this lesson, we take a deep dive into evaluating IAM policies, creating IAM restrictions, and validating permissions in AWS.

Lesson 5

Building Organizational Role and Access Visualization

In this lesson, we focus on building an IAM architecture diagram that visualizes and defines the organizational structure of users, permissions, and resources.

Lesson 6

Enforcing IAM Policy Configurations

In this lesson, we wrap up the course by focusing on monitoring policy compliance, enforcing IAM policy configurations, and policy remediation in AWS.

Lesson 7 • Project

Architecting IAM Implementation with Enforcement

In this project, you will implement and enforce identity access management within AWS by implementing a role structure with policies that will be evaluated and enforced.

Course 4 4 weeks

Infrastructure and Network Security Architecture Planning and Design

In this course, you'll learn how to plan and build the architecture to ensure that your organization's security is up to date and well defended.

Lesson 1

Introduction: Infrastructure & Network Security Architecture

This is the introduction lesson to this course.

Lesson 2

Infrastructure & Network security Architecture Planning

In this lesson, you'll learn about planning the design for your Infrastructure and Network Security.

Lesson 3

Building Intelligence Driven, Defense in Depth Architecture

In this lesson, you'll put your security plan into practice with intelligence-driven, Defense-in-Depth best practices.

Lesson 4

Threat Surface Analysis & Building Scalable Detection Service

In this lesson, you'll ensure that your security plan is scalable and that you have taken the threat surface into account properly.

Lesson 5

Threat Triage and Detection Enrichment

In this lesson, you'll further build on your threat architecture to quickly detect and triage threats.

Lesson 6 • Project

Watertight Security

This is the project lesson for the Infrastructure & Network Security Architecture Planning & Design course.

Taught By The Best

Photo of Erick Galinkin

Erick Galinkin

Principal AI Researcher

Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.

Photo of  William O. Ferguson

William O. Ferguson

Cloud Architect

William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.

Photo of  Abhinav Singh

Abhinav Singh

Cybersecurity Researcher

Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.

Photo of Sjon-Paul Brown

Sjon-Paul Brown

Senior DevOps Engineer

Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.

Ratings & Reviews

Average Rating: 4.6 Stars

9 Reviews

Raj Mohan M.

May 22, 2022

ITs fantastic- give a practical approach. But keep it in mind not all the users do have background on database and stuff. hence good to have similar project work as an example which could have given me the confidence to take the first project.

Mauro Antonio L.

April 18, 2022

Everything great with the projects, they are challenging.

Anonymous

April 12, 2022

Amazing

Mohamed A.

December 20, 2021

Thank you, this project is so useful

Jai Kishore V.

November 27, 2021

Great, full of new experiential learning

Page 1 of 1

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Unlock access to Security Architect and the rest of our best-in-class catalog

  • Unlimited access to our top-rated courses

  • Real-world projects

  • Personalized project reviews

  • Program certificates

  • Proven career outcomes

Full Catalog Access

One subscription opens up this course and our entire catalog of projects and skills.

Month-To-Month

4 Months

*

Average time to complete a Nanodegree program

*Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Your subscription also includes:

Get Started Today

Security Architect

Month-To-Month


  • Unlimited access to our top-rated courses
  • Real-world projects
  • Personalized project reviews
  • Program certificates
  • Proven career outcomes

4 Months

Average time to complete a Nanodegree program

  • All the same great benefits in our month-to-month plan
  • Most cost-effective way to acquire a new set of skills
Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Related Programs

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2024 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2024 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.