Udacity part of Accenture logo
Log InJoin for Free

The School Of

Cybersecurity

Build expertise in security analysis, security engineering, enterprise security, security architecture, ethical hacking, and data privacy. With the skills you learn in our cybersecurity courses, you can launch or advance a successful career in the field.

View Programs

Learning Paths by Job Title

Cybersecurity training helps learners identify, correct, and respond to security weaknesses and incidents through open-ended projects that mimic workplace security challenges. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures.

Steps To Become A Security Analyst

  • Introduction to Cybersecurity

    (115)

    3 months

    , Beginner

    Step 1

    Skills Covered

    Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Vulnerability management, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity risk management, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Firewall rules, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security

    Learn More
  • Step 2

    Skills Covered

    Intrusion detection systems, Threat modeling, Splunk, Security information and event management, Vulnerability assessment, Security risk classification, Did framework, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Snort ids, Logging, Cybersecurity incident remediation, Network traffic capture, Vulnerability lifecycle, Security risk mitigation, Penetration testing, Vulnerability mitigation, Technical communication, Threat actors, Internal threat mitigation, Cybersecurity fluency, Owasp top-10, Cybersecurity ttps, Patch management, External threat mitigation, Network attack vectors

    Learn More
  • Step 3

    Skills Covered

    Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Vulnerability assessment, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Red teaming, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research

    Learn More

Popular Cybersecurity Programs

View All

Cybersecurity Across Industries

  • Finance

    • Banks, financial institutions, and payment processors deal with vast amounts of sensitive financial data.
    • It’s important to invest heavily in cybersecurity measures to protect customer information, prevent fraud, and ensure secure financial transactions.
  • Retail

    • Retailers and e-commerce businesses store customer payment information, personal data, and order details.
    • Cybersecurity is crucial to safeguard customer data, prevent breaches, and maintain consumer trust.
  • Technology

    • Technology companies and software providers rely on robust cybersecurity measures to protect their intellectual property, source code, and customer data.
    • Technology companies are often prime targets for cyberattacks due to the value of the information they possess, making the best cybersecurity practices necessary.
  • Defense

    • Government agencies and defense organizations handle sensitive classified information and must protect national security interests.
    • Robust cybersecurity measures are crucial to safeguard critical infrastructure, defense systems, and government networks.

Programs Co-created With Cybersecurity Leaders.

Security Scorecard

Explore Other Schools

Artificial IntelligenceAutonomous SystemsBusinessCareer Resources Cloud ComputingData ScienceExecutive LeadershipProduct ManagementProgramming & DevelopmentView Full Catalog

Get Started Today

The Latest Technical Skills. Yours For The Taking.

Start For Free
Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2024 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2024 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.