State-of-the-art Security Defenses, a builders’ approach




Two 3 month terms

Study 10 hrs/week


Intermediate programming experience, such as Python or Go, familiarity with Linux, networking, and cloud basics


As part of the Cybersecurity Nanodegree Program, the students will have:

General Info

  • Designed and deployed a cloud stack in AWS or GCP
  • Detected and auto-remediated cloud misconfigurations that could have created security holes
  • Taken application security to another level by deploying pervasive encryption using key management systems
  • Taken inventory of a system, assessed the security situation, and proposed changes

Project Examples

Cloud Infrastructure Primer

Warm up with cloud infrastructure by manually setting up a virtual server with security groups and SSH to create an Apache server that serves HTML code the world!

Advanced Cloud Infrastructure

Use Terraform and infrastructure­-as-­code, to build upon an entire cloud environment that is the basis of a usable full stack application that will expose a web front­-end and functional APIs. All the components necessary to create a basic secure platform are found here: front­-end servers, databases, bastions, load­-balancers, and everything in between including security groups for proper segmentation.

Detect and Auto­-remediate Cloud Misconfigurations

Build a system that will be able to automatically detect and rectify security misconfigurations in a cloud environment. Learn to detect gaps in security between what specifications should exist and what is currently there. Learn to effectively respond to these gaps, and neutralize existing threat vectors.

Pervasive Key Encryption

Design and deploy pervasive, application­-layer encryption leveraging key management systems and application-­based authorizations, amongst other application-­security challenges.

A Security Event Aggregation System

Design and deploy a system that will aggregate security events. This system will store, analyze, and be able to alert the necessary people when a security event occurs. The system will be able to collect events from multiple sources.

Using Analytics to Detect Security Issues

Leverage different analytics frameworks to detect security issues at multiple levels in your infrastructure, including network, application, and endpoints. Use these frameworks to display the overall health and security of your infrastructure and applications.

Red vs. Blue

Team up with your fellow classmates to participate in a Red (attackers) vs. Blue (defenders) team exercise. This will involve attacking and defending a cloud production environment.


After successful completion of all projects and graduation, the participants will be able to:

  • Work as security-minded software engineers at companies of all sizes
  • Assume a dedicated Security Engineering role in a security or engineering team

This program is designed to be job-ready, that is, successful graduates will have the theoretical and practical skills to be successful in the roles outline above—whether it’s through a promotion or transfer in their current company or by starting a new career in the security domain.

How do the Nanodegrees work?

Choose your



Receive support and evaluation immediately


Get a 

valuable degree


Become a security engineer


For more information:

©2018 Udacity, Inc. All Rights Reserved 

All other marks are the property of their respective owners.