Nanodegree key: nd545
Version: 5.0.0
Locale: en-us
Content
Part 01 : Welcome to the Nanodegree Program
-
Module 01: Welcome to the Nanodegree Program
-
Lesson 02: Mentor Help, Peer Chat, and Careers
You are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.
Part 02 : Cybersecurity Foundations
-
Module 01: Cybersecurity Foundations
-
Lesson 01: Welcome to Cybersecurity Fundamentals
In this lesson, you will be given an overview of the course.
- Concept 01: Meet your Instructor
- Concept 02: Course Outline
- Concept 03: Lesson Outline
- Concept 04: Introduction to Cybersecurity
- Concept 05: Cybersecurity and You
- Concept 06: Business stakeholders
- Concept 07: History of Cybersecurity
- Concept 08: Tools & Environment
- Concept 09: Create a Workspace in Azure
- Concept 10: Project: Cybersecurity Fundamentals
- Concept 11: Lesson Conclusion
-
Lesson 02: What is Cybersecurity
In this lesson, you will learn the security trend and how to develop a career in cybersecurity.
- Concept 01: Introduction
- Concept 02: Cybersecurity Overview
- Concept 03: The Security Mindset
- Concept 04: Lesson Outline
- Concept 05: Security Trends
- Concept 06: Security Trends Quizzes
- Concept 07: Security Trends Exercise
- Concept 08: Security Trends Exercise Solution
- Concept 09: Cybersecurity Careers
- Concept 10: Cybersecurity Careers Quizzes
- Concept 11: Cybersecurity Careers Exercise
- Concept 12: Cybersecurity Careers Exercise Solution
- Concept 13: Security Principles
- Concept 14: Security Principles Quizzes
- Concept 15: Security Best Practices
- Concept 16: Security Best Practice Quizzes
- Concept 17: Security Best Practice Exercise
- Concept 18: Security Best Practice Exercise Solution
- Concept 19: Lesson Conclusion
-
Lesson 03: Maintain a Secure Infrastructure
In this lesson, you will learn some cybersecurity laws and some basics about security governance, compliance, and regulations.
- Concept 01: Introduction
- Concept 02: Rules Governing Cybersecurity
- Concept 03: Lesson Outline
- Concept 04: Governance and Compliance
- Concept 05: Governance and Compliance Quizzes
- Concept 06: Governance and Compliance Exercise
- Concept 07: Governance and Compliance Exercise Solution
- Concept 08: Intro to Security Regulations
- Concept 09: Intro to Security Regulations Quizzes
- Concept 10: Intro to Security Regulations Exercise
- Concept 11: Intro to Security Regulations Exercise Solution
- Concept 12: NIST Cybersecurity Framework
- Concept 13: NIST Cybersecurity Framework Quizzes
- Concept 14: NIST Cybersecurity Framework (CSF) Exercise
- Concept 15: NIST Cybersecurity Framework Exercise Solution
- Concept 16: Center for Internet Security Controls
- Concept 17: Center for Internet Security Controls Quizzes
- Concept 18: Center for Internet Security Controls Exercise
- Concept 19: Center for Internet Security Controls Exercise Solution
- Concept 20: Lesson Conclusion
-
Lesson 04: Think Like a Hacker
In this lesson, you will learn the hacking lifecycle and the basics of vulnerability, threat, and attack.
- Concept 01: Introduction
- Concept 02: Lesson Outline
- Concept 03: Hacker Process
- Concept 04: Hacking Lifecycle
- Concept 05: Hacking Lifecycle Quizzes
- Concept 06: Hacking Lifecycle - Exercise Part 1
- Concept 07: Hacking Lifecycle - Exercise Part 2
- Concept 08: Vulnerability Management
- Concept 09: Vulnerability Management Quizzes
- Concept 10: Identifying Software Vulnerabilities Exercise
- Concept 11: Identifying Vulnerabilities Exercise Solution
- Concept 12: Introduction to Threats, Attacks, and Exploits
- Concept 13: Introduction to Threats, Attacks, and Exploits Quizzes
- Concept 14: Introduction to Threats, Attacks, and Exploits Exercise
- Concept 15: Introduction to Threats, Attacks, and Exploits Solution
- Concept 16: Lesson Conclusion
-
Lesson 05: Security Defenses
In this lesson, you will learn some basic methods to keep your computer and network safe.
- Concept 01: Introduction
- Concept 02: Establishing Security Defenses
- Concept 03: Lesson Outline
- Concept 04: Layering Protection
- Concept 05: Layering Protection Quizzes
- Concept 06: Layering Protection Exercise
- Concept 07: Layering Protection Exercise Solution
- Concept 08: Identity and Access Control
- Concept 09: Identity and Access Control Quizzes
- Concept 10: Connect to Exercise VM
- Concept 11: Identity and Access Control Exercise
- Concept 12: Identity and Access Control Exercise Solution
- Concept 13: Patching & Updating
- Concept 14: Patching & Updating Quizzes
- Concept 15: Patching & Updating Exercise
- Concept 16: Patching & Updating Exercise Solution
- Concept 17: Web and Email Security
- Concept 18: Web and Email Security Quizzes
- Concept 19: Web and Email Security Exercises
- Concept 20: Web and Email Security Solutions
- Concept 21: Lesson Conclusion
-
Lesson 06: Applying Cybersecurity
In this lesson, you will practice applying cybersecurity to many situations.
- Concept 01: Introduction
- Concept 02: Applying Cybersecurity
- Concept 03: Lesson Outline
- Concept 04: Identify Existing Assets and Security Controls
- Concept 05: Identify Existing Assets and Security Controls Quizzes
- Concept 06: Identify Existing Assets and Security Controls Exercise
- Concept 07: Identify Existing Assets and Security Controls Solution
- Concept 08: Analyze Vulnerabilities and Threats
- Concept 09: Analyze Vulnerabilities and Threats Quizzes
- Concept 10: Analyze Vulnerabilities and Threats Exercise
- Concept 11: Analyze Vulnerabilities and Threats Exercise Solution
- Concept 12: Recommend and Apply Basic Security Controls
- Concept 13: Recommend and Apply Basic Security Controls Quizzes
- Concept 14: Recommend and Apply Basic Security Controls Exercise
- Concept 15: Recommend and Apply Basic Security Controls Solution
- Concept 16: Communicate Risks Exercise
- Concept 17: Communicate Risks Exercise Solution
- Concept 18: Lesson Conclusion
- Concept 19: Recap of Course
- Concept 20: Congratulations
-
Lesson 07: Project: Securing a Business Network
In this project, you will apply the skills you have learned in this course to secure a business network.
-
Part 03 : Defending and Securing Systems
-
Module 01: Defending and Securing Systems
-
Lesson 01: Introduction to Defending and Securing Systems
Course introduction to Introduction to Defending and Securing Systems
- Concept 01: Meet Your Instructor
- Concept 02: Prerequisites
- Concept 03: Introduction to Defending and Securing Systems
- Concept 04: Defending and Securing Systems Is Important
- Concept 05: Defending and Securing Systems Stakeholders
- Concept 06: History of Defending and Securing Systems
- Concept 07: Course Outline
- Concept 08: Tools, Environment & Dependencies
- Concept 09: Project: Monitoring and Securing the DFI Environment
- Concept 10: Good Luck!
-
Lesson 02: Defending Computer Systems and Security Principles
In this lesson you will learn about best practices in defending computer systems.
- Concept 01: Introduction to Defending Computer Systems And Security Principles
- Concept 02: Defense in Depth
- Concept 03: Defending Computer Systems And Security Principles
- Concept 04: Defense in Depth Introduction
- Concept 05: Quizzes: Defense in Depth Introduction
- Concept 06: Exercise: Defense in Depth Introduction
- Concept 07: Exercise Solution: Defense in Depth Introduction
- Concept 08: NIST 800 Framework
- Concept 09: NIST 800 Quizzes
- Concept 10: NIST 800 Exercise
- Concept 11: NIST 800 Exercise Solution
- Concept 12: Principle of Least Privileged
- Concept 13: Least Privileged Quizzes
- Concept 14: Least Privileged Exercise
- Concept 15: Least Privileged Exercise Solution
- Concept 16: When do these policies not apply
- Concept 17: Lesson Conclusion
-
Lesson 03: System Security: Securing Networks
In this lesson you will learn how to secure networks.
- Concept 01: System Security: Securing Networks
- Concept 02: Get the Foundation
- Concept 03: System Security: Securing networks
- Concept 04: Firewalls
- Concept 05: Firewalls Quizzes
- Concept 06: Automated Threat Intelligence
- Concept 07: Quizzes: Automated Threat Intelligence
- Concept 08: Firewalls Exercise
- Concept 09: Exercise Solution: Firewalls
- Concept 10: Wireless
- Concept 11: Wireless Quizzes
- Concept 12: Wireless Exercise
- Concept 13: Wireless Exercise Solution
- Concept 14: IDS/IPS Systems
- Concept 15: IDS/IPS Quizzes
- Concept 16: IDS/IPS Exercise
- Concept 17: IDS/IPS Exercise Solution
- Concept 18: Securing Windows at the OS Level
- Concept 19: Quizzes: Securing Windows at the OS Level
- Concept 20: Updating Windows
- Concept 21: Quizzes: Updating Windows
- Concept 22: Exercise: Securing Windows at the OS Level
- Concept 23: Exercise Solution: Securing Windows at the OS Level
- Concept 24: Securing Linux at the OS Level
- Concept 25: Quizzes: Securing Linux at the OS Level
- Concept 26: Updating Linux
- Concept 27: Quizzes: Updating Linux Quizzes
- Concept 28: Exercise: Securing Linux at the OS Level
- Concept 29: Exercise Solution: Securing Linux at the OS Level
- Concept 30: Not Installing updates
- Concept 31: System Security: Securing Networks Lesson Conclusion
-
Lesson 04: Monitoring and Logging for Detection of Malicious Activity
In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
- Concept 01: Monitoring and Logging for Detection of Malicious Activity Lesson Introduction
- Concept 02: Monitoring and Logging Overview
- Concept 03: Monitoring and Logging for Detection of Malicious Activity
- Concept 04: System Event Logs
- Concept 05: Quizzes: System Event Logs
- Concept 06: Exercise: System Event Logs
- Concept 07: Exercise Solution: System Event Logs
- Concept 08: Monitoring Network Traffic
- Concept 09: Quizzes: Monitoring Network Traffic
- Concept 10: Exercise: Monitoring Network Traffic
- Concept 11: Exercise Solution: Monitoring Network Traffic
- Concept 12: SIEM Framework
- Concept 13: Quizzes: SIEM
- Concept 14: Exercise: SIEM
- Concept 15: Exercise Solution: SIEM
- Concept 16: When is an alert not an alert?
- Concept 17: Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion
-
Lesson 05: Cryptography Basics (Applied Cryptography)
In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
- Concept 01: Cryptography Basics
- Concept 02: Cryptography Overview
- Concept 03: Cryptography Basics (Applied Cryptography)
- Concept 04: Introduction to Encryption
- Concept 05: Quizzes: Introduction to Encryption
- Concept 06: Exercise: Introduction to Encryption
- Concept 07: Exercise Solution: Introduction to Encryption
- Concept 08: Encryption in Transit
- Concept 09: Quizzes: Encryption in Transit
- Concept 10: Exercise: Encryption in Transit
- Concept 11: Exercise Solution: Encryption in Transit
- Concept 12: File Hashes/Digital Signatures
- Concept 13: Quizzes: File Hashes/Digital Signatures
- Concept 14: Exercise: File Hashes/Digital Signatures
- Concept 15: Exercise Solution: File Hashes/Digital Signatures
- Concept 16: When Encryption is not a Good idea
- Concept 17: Exercise: Cryptography Basics Final
- Concept 18: Cryptography Basics (Applied Cryptography) Lesson Conclusion
- Concept 19: Course Recap
-
Part 04 : Threats, Vulnerabilities, and Incident Response
-
Module 01: Threats, Vulnerabilities, and Incident Response
-
Lesson 01: Intro to Threats, Vulnerabilities, and Incident Response
Meet your instructor, discuss what you'll learn in this course, and more!
- Concept 01: Meet Your Instructor
- Concept 02: Course Outline
- Concept 03: Prerequisites
- Concept 04: Intro to Threats, Vulnerabilities, and Incident Response
- Concept 05: Threats, Vulnerabilities, and Incident Response Is Important
- Concept 06: Stakeholders
- Concept 07: Do's and Don'ts
- Concept 08: History of Threats, Vulnerabilities, and Incident Response
- Concept 09: Tools, Environment & Dependencies
- Concept 10: Project
- Concept 11: Let's Recap!
- Concept 12: Good Luck!
-
Lesson 02: Assessing Threats
This lesson will cover threats and vulnerabilities, threat motivations, threats to organizations, and threat responses.
- Concept 01: Lesson Overview
- Concept 02: Managing and Prioritizing Risks
- Concept 03: Threats
- Concept 04: Threat Assessment Fundamentals
- Concept 05: Quiz: Threat Assessment Fundamentals
- Concept 06: Exercise: Threat Assessment Fundamentals
- Concept 07: Exercise Solution: Threat Assessment Fundamentals
- Concept 08: Threat and Attack Types
- Concept 09: Quiz: Threat and Attack Types
- Concept 10: Exercise: Threat and Attack Types
- Concept 11: Exercise Solution: Threat Assessment Fundamentals
- Concept 12: Threat Actors and Motivations
- Concept 13: Quiz: Threat Actors and Motivations
- Concept 14: Exercise: Threat Actors and Motivations
- Concept 15: Exercise Solution: Threat Actors and Motivations
- Concept 16: Organizing and Executing Threat Assessments
- Concept 17: Quiz: Organizing and Executing Threat Assessments
- Concept 18: Exercise: Organizing and Executing Threat Assessments
- Concept 19: Solution: Organizing and Executing Threat Assessments
- Concept 20: Lesson Recap
-
Lesson 03: Finding Security Vulnerabilities
In this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Finding Vulnerabilities
- Concept 04: Understanding Attack Methods
- Concept 05: Quiz: Understanding Attack Methods
- Concept 06: Exercise: Understanding Attack Methods
- Concept 07: Exercise Solution: Understanding Attack Methods
- Concept 08: Understanding Testing Methods and Tools
- Concept 09: Quiz: Understanding Testing Methods and Tools
- Concept 10: Exercise: Understanding Testing Methods and Tools
- Concept 11: Exercise Solution: Understanding Testing Methods and Tools
- Concept 12: Vulnerability Scanning
- Concept 13: Quiz: Vulnerability Scanning
- Concept 14: Exercise: Vulnerability Scanning
- Concept 15: Exercise Solution: Vulnerability Scanning
- Concept 16: Penetration Testing
- Concept 17: Quiz: Penetration Testing
- Concept 18: Exercise: Penetration Testing
- Concept 19: Exercise Solution: Penetration Testing
- Concept 20: Lesson Recap
-
Lesson 04: Fixing Security Vulnerabilities
We're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Fixing Vulnerabilities
- Concept 04: Remediation Planning Fundamentals
- Concept 05: Quiz: Remediation Planning Fundamentals
- Concept 06: Exercise: Remediation Planning Fundamentals
- Concept 07: Exercise Solution: Remediation Planning Fundamentals
- Concept 08: Researching and Validating Findings
- Concept 09: Quiz: Research and Validating Findings
- Concept 10: Exercise: Researching and Validating Findings
- Concept 11: Exercise Solution: Researching and Validating Findings
- Concept 12: Prioritizing Findings
- Concept 13: Quiz: Prioritizing Findings
- Concept 14: Exercise: Prioritizing Findings
- Concept 15: Exercise Solution: Prioritizing Findings
- Concept 16: Recommending Remediation Strategies
- Concept 17: Quiz: Recommending Remediation Strategies
- Concept 18: Exercise: Recommending Remediation Strategies
- Concept 19: Exercise Solution: Recommending Remediation Strategies
- Concept 20: Lesson Recap
-
Lesson 05: Preparing for Inevitable Attacks
Finally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Preparing for Attacks
- Concept 04: Contingency Planning Fundamentals
- Concept 05: Contingency Planning Fundamentals Quiz
- Concept 06: Incident Response Life Cycle
- Concept 07: Incident Response Life Cycle Quiz
- Concept 08: Exercise: Incident Response Life Cycle
- Concept 09: Exercise Solution: Incident Response Life Cycle
- Concept 10: Incident Response Planning
- Concept 11: Incident Response Planning Quiz
- Concept 12: Exercise: Incident Response Planning
- Concept 13: Digital Forensics
- Concept 14: Digital Forensics Quiz
- Concept 15: Exercise: Digital Forensics
- Concept 16: Exercise Solution: Digital Forensics
- Concept 17: Lesson Recap
- Concept 18: Course Overview
-
Lesson 06: Project: Navigating a Cybersecurity Incident
During the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.
-
Part 05 : Governance, Risk, and Compliance
-
Module 01: Governance, Risk, and Compliance
-
Lesson 01: GRC Overview
In this lesson, we’ll be outlining the basic course structure and discussing the prerequisites that you should possess before taking the course.
-
Lesson 02: Introduction to Governance, Risk, and Compliance
During this lesson, we will lay the groundwork for the rest of the course by developing a definition for Security GRC and briefly introducing how GRC roles function today.
- Concept 01: Lesson Introduction
- Concept 02: Introduction to Governance, Risk, and Compliance
- Concept 03: Overview
- Concept 04: Quiz: Overview
- Concept 05: Security Governance, Risk, and Compliance
- Concept 06: Quiz: Security Governance, Risk, and Compliance
- Concept 07: Security Controls
- Concept 08: Defining GRC Roles
- Concept 09: Quiz: Defining GRC Roles
- Concept 10: Defining GRC Roles Exercise
- Concept 11: Defining GRC Roles Exercise Solution
- Concept 12: GRC Interrelation
- Concept 13: Quiz: GRC Interrelation
- Concept 14: GRC Interrelation Exercise
- Concept 15: GRC Interrelation Exercise Solution
- Concept 16: Interpreting Organizational Needs
- Concept 17: Quiz: Interpreting Organizational Needs
- Concept 18: Interpreting Organizational Needs Exercise
- Concept 19: Lesson Recap
-
Lesson 03: Governance
This lesson focuses on the role of security governance. This is what puts the “G” in GRC.
- Concept 01: Lesson Overview
- Concept 02: Governance Overview
- Concept 03: Quiz: Governance Overview
- Concept 04: Strategic Thinking
- Concept 05: Exercise: Strategic Thinking
- Concept 06: Exercise Solution: Strategic Thinking
- Concept 07: Championing Security
- Concept 08: Quiz: Championing Security
- Concept 09: Exercise: Championing Security
- Concept 10: Exercise Solution: Championing Security
- Concept 11: Designing Measurement
- Concept 12: Quiz: Designing Measurement
- Concept 13: Measurement and Reporting
- Concept 14: Quiz: Measurement and Reporting
- Concept 15: Exercise: Measurement and Reporting
- Concept 16: Policy and Procedure Management
- Concept 17: Quiz: Policy and Procedure
- Concept 18: Exercise: Policy and Procedure Management
- Concept 19: Exercise Solution: Policy and Procedure Management
- Concept 20: Lesson Recap
-
Lesson 04: Risk
In this lesson we’ll learn how risk management has evolved over time into today’s security risk management practice and explore some of the tools risk managers use.
- Concept 01: Lesson Overview
- Concept 02: Risk Overview
- Concept 03: Quiz: Risk Overview
- Concept 04: # Measuring Security Risk
- Concept 05: Quiz: Measuring Security Risk
- Concept 06: Risk Statements
- Concept 07: Quiz: Risk Statements
- Concept 08: Risk Management Framework Example - NIST
- Concept 09: Quiz: Risk Management Framework Example - NIST
- Concept 10: Risk Management Framework Example - FAIR
- Concept 11: Quiz: Risk Management Framework Example - FAIR
- Concept 12: Exercise: Risk Mgmt. Frameworks
- Concept 13: Frameworks in Practice
- Concept 14: Quiz: Frameworks in Practice
- Concept 15: Exercise: Frameworks in Practice
- Concept 16: Identifying Systems and Associated Risks
- Concept 17: Quiz: Identifying Systems and Associated Risks
- Concept 18: Exercise: Identifying Systems and Associated Risks
- Concept 19: Risk Treatment
- Concept 20: Exercise: Risk Treatment
- Concept 21: Risk Registers
- Concept 22: Quiz: Risk Registers
- Concept 23: POAMs and Other Risk Treatment Documentation
- Concept 24: Quiz: POAMs and Other Risk Treatment Documentation
- Concept 25: Exercise: Developing a Mitigation Plan
- Concept 26: Exercise Solution: Developing a Mitigation Plan
- Concept 27: Lesson Recap
-
Lesson 05: Compliance
Compliance deals with a relatively structured approach to ensuring organizations meet their obligations to security standards through their security controls and practices.
- Concept 01: Lesson Overview
- Concept 02: Forces Driving Compliance
- Concept 03: Quiz: Forces Driving Compliance
- Concept 04: Compliance and Objectives
- Concept 05: Quiz: Compliance and Objectives
- Concept 06: Obligation Sources
- Concept 07: Quiz: Obligation Sources
- Concept 08: Exercise: Obligation Sources
- Concept 09: Compliance Obligation Evaluation
- Concept 10: Quiz: Compliance Obligation
- Concept 11: Exercise: Compliance Obligation Evaluation
- Concept 12: Control Assessments
- Concept 13: Quiz: Control Assessment
- Concept 14: Exercise: Control Assessment
- Concept 15: Lesson Recap
-
Lesson 06: Audit Management
The lesson focuses on ensuring that audits go smoothly by developing an understanding of audit management fundamentals and how GRC professionals should plan for and remediate audit results.
- Concept 01: Lesson Overview
- Concept 02: Why you must manage Audits
- Concept 03: Audit Management
- Concept 04: Audit Management Fundamentals
- Concept 05: Quiz: Audit Management Fundamentals
- Concept 06: Exercise: Audit Management Fundamentals
- Concept 07: Exercise Solution: Audit Management Fundamentals
- Concept 08: Follow Up and Remediation Plans
- Concept 09: Quiz: Follow-up and Remediation
- Concept 10: Exercise: Remediation Plans
- Concept 11: Exercise Solution: Follow-Up and Remediation Plan
- Concept 12: Lesson Recap
- Concept 13: Course Recap
- Concept 14: Congratulations!
-
Lesson 07: Project: SwiftTech Report
Apply the skills you have acquired to analyze data provided about a fictional technology company and create fundamental components of the company’s GRC program.
Project Description - Project: Create the SwiftTech GRC Program
-
Part 06 : Career Services
The Careers team at Udacity is here to help you move forward in your career - whether it's finding a new job, exploring a new career path, or applying new skills to your current job.
-
Module 01: Career Services
-
Lesson 01: Take 30 Min to Improve your LinkedIn
Find your next job or connect with industry peers on LinkedIn. Ensure your profile attracts relevant leads that will grow your professional network.
- Concept 01: Get Opportunities with LinkedIn
- Concept 02: Use Your Story to Stand Out
- Concept 03: Why Use an Elevator Pitch
- Concept 04: Create Your Elevator Pitch
- Concept 05: Use Your Elevator Pitch on LinkedIn
- Concept 06: Create Your Profile With SEO In Mind
- Concept 07: Profile Essentials
- Concept 08: Work Experiences & Accomplishments
- Concept 09: Build and Strengthen Your Network
- Concept 10: Reaching Out on LinkedIn
- Concept 11: Boost Your Visibility
- Concept 12: Up Next
-