Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Gain the highly sought-after skills to protect an organization’s computer networks and systems from security threats or attacks.
01Days06Hrs51Min20Sec
At 10 hours/week
Get access to the classroom immediately upon enrollment
You’ll master the foundational skills necessary to become a successful Security Engineer. This program will focus on how to protect a company’s computer systems, networks, applications and infrastructure from security threats or attacks.
Basics of Python, experience configuring Windows and Linux environments.
This course introduces the fundamental concepts and practices of security engineering. These are the basic principles and properties a security engineer will apply when evaluating, prioritizing and communicating security topics. Additionally, you’ll learn about the practical applications of cryptography. You will also learn about strategies for risk evaluation, security review and audit.
In this course, you’ll start by exploring the basics of system security and its implementation at the operating system level. You will learn about implementing authentication and authorization as a means to protect access to data and services. You will also learn about detecting unauthorized changes to a system and how to effectively counter them. By the end, you will understand how to build logging, monitoring and auditing tools that can alert you to system security breaches and how to effectively counter them in a real-world case.
In this course, you will be introduced to the industry best practices for security configurations and controls. You will perform an assessment that includes security benchmarks, configurations and controls. You will also scan the main infrastructure operating systems for vulnerabilities and produce a report based on an industry scenario. At the end of this course, you will be familiar with industry terminology and security best practices. You will also learn to perform vulnerability scans and produce industry-standard reports.
In this course, you will learn the basics of secure web application. You will start by learning about OWASP and the Top 10 list of vulnerabilities within web applications. You will also learn how to do Static code scans using special software and even how to manually test a web application. By the end of this course you will be able to work as a security expert that can help shape the security posture of the development team to help build more secure web applications.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.
You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
Taylor is an information security leader with over 10 years experience building a wide range of security programs. Taylor is currently head of information security for Clearwater Analytics. Previously he was a leader in application security at Adobe.
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
Rod has over 15 years of experience in information technology and security. He has worked at Prolexic, Akamai, Caspida, and Splunk. He is the co-founder of HackMiami and the Pacific Hackers meetup and conferences.
Dev has worked in the cybersecurity field for more than 10 years, and is now VP of Product Innovation at one of the top cybersecurity companies. His area of expertise is red team and exploit development, with a focus on active cybersecurity defense.
Learn to protect a company’s computer systems, networks, applications and infrastructure from security threats or attacks.
On average, successful students take 4 months to complete this program.
The global cybersecurity market is currently worth $173B in 2020, growing to $270B by 2026. Despite the downturn in the overall economy, businesses continue to invest in cybersecurity because the majority of the workforce is critically dependent on cyber to function. This program was designed to help you take advantage of this growing need for skilled security professionals.
The need for a strong computer security culture in an enterprise organization is greater than ever. The skills you will gain from this Nanodegree program will qualify you for systems engineers roles in any industry as countless companies are boosting security protocols.
This course is for developers and IT professionals — with some exposure to security — who want to advance their career by diving deeper into the world of cybersecurity.
No. This Nanodegree program accepts all applicants regardless of experience and specific background.
A well-prepared learner is already able to:
Students who do not feel comfortable in the above may consider taking Udacity’s Introduction to Cybersecurity course to obtain prerequisite skills.
The Security Engineer Nanodegree program is comprised of content and curriculum to support four projects. We estimate that students can complete the program in four months, working about ten hours per week. Each project will be reviewed by the Udacity reviewer network. Feedback will be provided, and if you do not pass the project, you will be asked to resubmit the project until it passes.
You will have access to this Nanodegree program for as long as your subscription remains active. The estimated time to complete this program can be found on the webpage and in the syllabus, and is based on the average amount of time we project that it takes a student to complete the projects and coursework. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.
Please see the Udacity Program FAQs for policies on enrollment in our programs.
There are no software and version requirements to complete this Nanodegree program. All coursework and projects can be completed via Student Workspaces in the Udacity online classroom.