Udacity part of Accenture logo

Systems Security

Course

In this course, you will learn about implementing authentication and authorization You will learn how to build and utilize tools that can alert you to system security breaches and you'll know how to effectively counter them.

In this course, you will learn about implementing authentication and authorization You will learn how to build and utilize tools that can alert you to system security breaches and you'll know how to effectively counter them.

  • Intermediate

  • 1 month

  • Last Updated February 11, 2025

Skills you'll learn:

Access managementData encryption

Prerequisites:

No experience required

Intermediate

1 month

Last Updated February 11, 2025

Skills you'll learn:

Access management • Data encryption • Vulnerability assessment • Host-based idss

Prerequisites:

No experience required

Course Lessons

Lesson 1

Introduction to Systems Security

In this lesson, you'll be introduced to the course and what to expect!

Lesson 2

Third Party Vulnerabilities

In this lesson, you will start learning about third party vulnerabilities and how to protect against them.

Lesson 3

Authentication

In this lesson, you will learn about password management tools, securing remote access, and encryption.

Lesson 4

Authorization

In this lesson, you will learn about access control, ownership and permissions, and creating rules and filters.

Lesson 5

Isolation

In this lesson, you will learn about restricting access, access control, and memory attacks.

Lesson 6

Auditing

In this lesson, you will learn about logging and monitoring.

Lesson 7 • Project

Responding to a Nation-State Cyber Attack

In this project, you will detect a threat, mitigate it, and harden a system in the aftermath of a nation-state cyber attack.

Taught By The Best

Photo of Abhinav Singh

Abhinav Singh

Engineer/Consultant, Amazon Web Services

Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Enroll in Systems Security. Choose the plan that works for you

All Access monthly

  • Cancel Anytime

  • Unlimited access to our top-rated courses

  • Hands-on projects with expert feedback

  • Personalized career coaching and interview prep

  • Program Certificates

Best Value

All Access bundle1

  • All the same great benefits as our monthly plan

  • The most cost-effective way to develop the skills you want

  1. 1Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Your subscription also includes:

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2025 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2025 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.