State-of-the-art Security Defenses, a builders’ approach
Two 3 month terms
Study 10 hrs/week
Intermediate programming experience, such as Python or Go, familiarity with Linux, networking, and cloud basics
As part of the Cybersecurity Nanodegree Program, the students will have:
Cloud Infrastructure Primer
Warm up with cloud infrastructure by manually setting up a virtual server with security groups and SSH to create an Apache server that serves HTML code the world!
Advanced Cloud Infrastructure
Use Terraform and infrastructure-as-code, to build upon an entire cloud environment that is the basis of a usable full stack application that will expose a web front-end and functional APIs. All the components necessary to create a basic secure platform are found here: front-end servers, databases, bastions, load-balancers, and everything in between including security groups for proper segmentation.
Detect and Auto-remediate Cloud Misconfigurations
Build a system that will be able to automatically detect and rectify security misconfigurations in a cloud environment. Learn to detect gaps in security between what specifications should exist and what is currently there. Learn to effectively respond to these gaps, and neutralize existing threat vectors.
Pervasive Key Encryption
Design and deploy pervasive, application-layer encryption leveraging key management systems and application-based authorizations, amongst other application-security challenges.
A Security Event Aggregation System
Design and deploy a system that will aggregate security events. This system will store, analyze, and be able to alert the necessary people when a security event occurs. The system will be able to collect events from multiple sources.
Using Analytics to Detect Security Issues
Leverage different analytics frameworks to detect security issues at multiple levels in your infrastructure, including network, application, and endpoints. Use these frameworks to display the overall health and security of your infrastructure and applications.
Red vs. Blue
Team up with your fellow classmates to participate in a Red (attackers) vs. Blue (defenders) team exercise. This will involve attacking and defending a cloud production environment.
After successful completion of all projects and graduation, the participants will be able to:
This program is designed to be job-ready, that is, successful graduates will have the theoretical and practical skills to be successful in the roles outline above—whether it’s through a promotion or transfer in their current company or by starting a new career in the security domain.
How do the Nanodegrees work?
Receive support and evaluation immediately
Become a security engineer
For more information: www.udacity.com/enterprise
©2018 Udacity, Inc. All Rights Reserved
All other marks are the property of their respective owners.