Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Find out how to build logging, monitoring, and auditing tools that can alert system security breaches.
Get access to classroom immediately on enrollment
Explore the basics of system security and its implementation at the operating system level. Learn about implementing authentication and authorization as a means to protect access to data and services. Learn about detecting unauthorized changes to a system and how to effectively counter them. By the end, you’ll understand how to build logging, monitoring, and auditing tools that can alert system security breaches and how to effectively counter them in a real-world case.
Basic familiarity with Cybersecurity topics
Explore the operating system’s security model and understand CVEs and third party advisory reports. Detect vulnerabilities in software and third-party libraries and patch identified vulnerabilities
Explore Unix password storage management and its security features. Defend remote service authentication mechanisms and server hardening principles and implement encryption for data at rest and in motion.
Understand access controls and their implementation as a means for securing data. Explore ways to detect unauthorized services and processes and how to remediate them. Use networking features to prevent unauthorized access to the system or server.
Learn how to implement a chroot jail to enhance system security. Understand mandatory access control and how it differs from discretionary access control. Understand advanced attacks like buffer overflows.
Implement auditing controls on critical files and services and host-based intrusion detection. Implement file integrity monitoring through osquery. Detect the presence of malware through system scans and write YARA rules for advanced threat hunting.
In this project, you will implement the course learnings to investigate a Linux virtual image that was taken from the server and was compromised in the cyber espionage campaign carried out by North Udan. You will work towards identifying the infection chain along with assessing and improving the system’s resilience against malicious attacks by building scanning, monitoring, and auditing tools.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.
Validate your understanding of concepts learned by checking the output and quality of your code in real-time.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
Find out how to build logging, monitoring, and auditing tools that can alert system security breaches.
On average, successful students take 1 month to complete this program.
No. This Course accepts all applicants regardless of experience and specific background.
Successful learners have knowledge of Linux, Python, command lines, and basic cybersecurity topics.
This course is comprised of content and curriculum to support one project. We estimate that students can complete the program in one month.
The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.
Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.
Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
Learners should have access to Docker.