Udacity Enterprise Syllabus Enterprise Security nd0035
Udacity Enterprise Syllabus Enterprise Security nd0035
Enterprise Security
NANODEGREE SYLLABUS
Overview
REAL-WORLD PROJECTS
Learners build new skills through industry-relevant
projects and receive personalized feedback from our
network of 900+ project reviewers. Our simple user
interface makes it easy to submit projects as often as
needed and receive unlimited feedback.
KNOWLEDGE
Answers to most questions can be found with
Knowledge, our proprietary wiki. Learners can search
questions asked by others and discover in real-time
how to solve challenges.
WORKSPACES
Learners can check the output and quality of their
code by testing it on interactive workspaces that are
integrated into the classroom.
QUIZZES
Understanding concepts learned during lessons is
made simple with auto-graded quizzes. Learners can
easily go back and brush up on concepts at anytime
during the course.
PROGRESS TRACKER
Personalized milestone reminders help learners stay
on track and focused as they work to complete their
Nanodegree program.
Students will get hands-on experience in building a secure enterprise network. They will segment the
network across different security topologies and employ the principle of least privilege to restrict access
across the various segmentations. Students will then build a VPN to access the enterprise network
from a remote location, then set up a SIEM and a web server. Students will monitor web server logs and
build alerts to help identify security incidents. Students will then write incident response playbooks for
certain attack scenarios. Lastly, students will design a Zero Trust model and write a comparative analysis
between current network architecture and Zero Trust.
You are a security engineer for Fed F1rst Control Systems. Fed F1rst has recently spun out of a larger
organization into a stand-alone company. You have been tasked with implementing the endpoint portion
of the organization’s security policy.
The tasks that follow represent real tasks that would be performed on a scheduled and on an as-needed
basis (for instance, server hardening is typically performed upon installation). You will recommend
hardening strategies on a Windows 10 desktop as well as a Windows 2016 server. In the exercises you
performed during the course, you performed these tasks on a CentOS Linux server. Those skills will come
in handy here.
Next, you will create several security policies for the organization. As with hardening, you also performed
this activity, but for different areas of the Information Technology department areas during the course.
Additionally, you will create build sheets for Windows and Linux cloud servers using the knowledge you
have gained throughout the course.
Finally, you will conduct a subset of a server self-assessment that is common during pre-work for
compliance audits.
Students’ scope includes a variety of entities within the architecture, such as the application itself, the
containers running services, and the external-facing API. Finally, students will create a remediation plan to
help prevent these vulnerabilities and harden your existing security standards.
On the other hand, cybersecurity professionals have to try and get it right every time to protect a company
from breaches. This means that tackling cyber risk requires a very strategic approach and it starts with
securing one of the greatest assets within the enterprise — data.
To begin mastering data security, during this course we’ll start by exploring the concept of data governance
so that students can build the foundation for understanding, classifying, and protecting data. Students
learn to navigate the variety of compliance regulations that apply to data security and create policies that
prevent unauthorized disclosure of information.
In the bulk of the course, students focus on protecting confidentiality, integrity, and availability of data
through concepts like encryption, auditing, file integrity monitoring, and back-up strategy.
In this project, students will apply the skills they have acquired in this security course to ensure
data security.
Students will be provided a realistic case study, company profile, and resource database. They’ll work
to classify data and justify which regulations apply to the data. They’ll use post-breach evidence to
perform a file integrity monitoring audit and determine if integrity was impacted. Students will also make
recommendations for ensuring data integrity in the future, such as creating a data security policy, mapping
out a data storage architecture and new encryption plan based on the data types, and establishing a
backup and recovery policy and testing it to protect the company in the future. The deliverable will be an
enterprise data security update delivered to the executive team detailing the security program established
within the enterprise. The final implementation of the project will showcase students’ data security
management skills, including their ability to make and justify recommendations to key stakeholders and
implement changes.
now at