Course 1: Welcome to the Nanodegree Program 50 minutesNanodegree Program IntroductionGetting HelpYou are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.Discover Your Company's Cybersecurity ScoreCourse 2: Cybersecurity Foundations Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.15 hoursWelcome to Cybersecurity FundamentalsIn this lesson, you will be given an overview of the course.What is CybersecurityIn this lesson, you will learn the security trend and how to develop a career in cybersecurity.Maintain a Secure InfrastructureIn this lesson, you will learn some cybersecurity laws and some basics about security governance, compliance, and regulations.Think Like a HackerIn this lesson, you will learn the hacking lifecycle and the basics of vulnerability, threat, and attack.Security DefensesIn this lesson, you will learn some basic methods to keep your computer and network safe.Applying CybersecurityIn this lesson, you will practice applying cybersecurity to many situations.Securing a Business NetworkIn this project, you will apply the skills you have learned in this course to secure a business network.Course 3: Defending and Securing Systems In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.16 hoursIntroduction to Defending and Securing SystemsCourse introduction to Introduction to Defending and Securing SystemsDefending Computer Systems and Security PrinciplesIn this lesson you will learn about best practices in defending computer systems.System Security: Securing NetworksIn this lesson you will learn how to secure networks.Monitoring and Logging for Detection of Malicious ActivityIn this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity. Cryptography Basics (Applied Cryptography)In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files. Monitoring and Securing the DFI EnvironmentThis lesson is the project lesson for Defending and Securing Systems course. Course 4: Threats, Vulnerabilities, and Incident Response Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.17 hoursIntro to Threats, Vulnerabilities, and Incident ResponseMeet your instructor, discuss what you'll learn in this course, major stakeholders and a brief history, and a peek at the final project! Assessing ThreatsThis lesson will cover threats and vulnerabilities, attack types, threat motivations, threats to organizations, and threat responses. Finding Security VulnerabilitiesIn this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing. Fixing Security VulnerabilitiesWe're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.Preparing for Inevitable AttacksFinally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans. Navigating a Cybersecurity IncidentDuring the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.Course 5: Governance, Risk, and Compliance This course provides an overview of governance, risk, and compliance. It focuses on the importance of GRC, identifying GRC concerns, and ways to mitigate those concerns.20 hoursGRC OverviewIn this lesson, we’ll be outlining the basic course structure and discussing the prerequisites that you should possess before taking the course. Introduction to Governance, Risk, and ComplianceDuring this lesson, we will lay the groundwork for the rest of the course by developing a definition for Security GRC and briefly introducing how GRC roles function today.GovernanceThis lesson focuses on the role of security governance. This is what puts the “G” in GRC.RiskIn this lesson we’ll learn how risk management has evolved over time into today’s security risk management practice and explore some of the tools risk managers use.ComplianceCompliance deals with a relatively structured approach to ensuring organizations meet their obligations to security standards through their security controls and practices.Audit ManagementThe lesson focuses on ensuring that audits go smoothly by developing an understanding of audit management fundamentals and how GRC professionals should plan for and remediate audit results.SwiftTech ReportApply the skills you have acquired to analyze data provided about a fictional technology company and create fundamental components of the company’s GRC program.Course 6: Congratulations! Congratulations on finishing your program!10 minutesCongratulations!Congratulations on your graduation from this program! Please join us in celebrating your accomplishments.CompanyAbout Us Why Udacity? Blog In the News Jobs at Udacity Become a Mentor Partner with Udacity ResourcesCatalog Career Outcomes Help and FAQ Scholarships Resource Center Udacity SchoolsSchool of Artificial Intelligence School of Autonomous Systems School of Business School of Cloud Computing School of Cybersecurity School of Data Science School of Executive Leadership School of Product Management School of Programming and Development Career Resources Featured ProgramsBusiness Analytics SQL AWS Cloud Architect Data Analyst Intro to Programming Digital Marketing Self Driving Car Engineer Only at UdacityArtificial Intelligence Deep Learning Digital Marketing Flying Car and Autonomous Flight Engineer Intro to Self-Driving Cars Machine Learning Engineer Robotics Software Engineer