0% found this document useful (0 votes)
288 views15 pages

Udacity Enterprise Syllabus Enterprise Security nd0035

Uploaded by

Saturnin Degla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
288 views15 pages

Udacity Enterprise Syllabus Enterprise Security nd0035

Uploaded by

Saturnin Degla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

T HE S CHO OL OF C Y B ER SECUR I T Y

Enterprise Security

NANODEGREE SYLLABUS
Overview

Enterprise Security Nanodegree Program

The goal of the Enterprise Security


Nanodegree program is to equip learners Program Information
with the foundational skills of security TIME
engineering within an enterprise setting. This 4 months
program addresses security topics related Study 5-10 hours/week
to corporate environments, which are often
distinct from production environments LEVEL
and center around the devices, identities, Intermediate
and infrastructure used by the company’s
personnel on a daily basis. PREREQUISITES
Linux and Azure
Graduates of this Nanodegree program
will be able to: HARDWARE/SOFTWARE
Build a siem and implement enterprise REQUIRED
network security best practices to monitor There are no software and
and control network traffic into an enterprise version requirements to complete
this Nanodegree program. All
Develop an asset and patch management to
coursework and projects can be
increase security posture of endpoints
completed via Student Workspaces
Design a security baseline for application in the Udacity online classroom.
development as well conduct an internal Udacity’s basic tech requirements
application security assessment consisting of can be found at https://www.
threat modeling, vulnerability scanning, and udacity.com/tech/requirements.
code review.
Establish data integrity checks as well data LEARN MORE ABOUT THIS
loss prevention mechanisms that control the NANODEGREE
types of data that can be transferred out of Contact us at
an enterprise [email protected]

2 THE SCHOOL OF C YBERSECURIT Y


Our Classroom Experience

REAL-WORLD PROJECTS
Learners build new skills through industry-relevant
projects and receive personalized feedback from our
network of 900+ project reviewers. Our simple user
interface makes it easy to submit projects as often as
needed and receive unlimited feedback.

KNOWLEDGE
Answers to most questions can be found with
Knowledge, our proprietary wiki. Learners can search
questions asked by others and discover in real-time
how to solve challenges.

WORKSPACES
Learners can check the output and quality of their
code by testing it on interactive workspaces that are
integrated into the classroom.

QUIZZES
Understanding concepts learned during lessons is
made simple with auto-graded quizzes. Learners can
easily go back and brush up on concepts at anytime
during the course.

CUSTOM STUDY PLANS


Create a custom study plan to suit your personal
needs and use this plan to keep track of your progress
toward your goal.

PROGRESS TRACKER
Personalized milestone reminders help learners stay
on track and focused as they work to complete their
Nanodegree program.

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Learn with the Best

Milind Adari Jerry Smith


SECURIT Y ENGINEER I N F O R M AT I O N S E C U R I T Y
ENGINEER
Milind Adari is a Security Engineer at
The Associated Press and an Adjunct Jerry is a member of the Security
Instructor at Columbia University. He is Operations Center for the University
responsible for protecting journalists all of Alabama at Birmingham, where
around the world from malicious threat he is the Lead Threat Hunter and
actors and state-sponsored attacks, a member of the firewall team.
all while educating students and Previously he was an Information
professionals in cybersecurity. Security Engineer for Hibbett
Sporting Goods.

Vamsee Kandimalla Christine Izuakor,


C Y B E R S E C U R I T Y A R C H I T E C T, PhD, CISSP
HE AD OF PRODUC T TECHNOLOGY
F O U N D E R & C E O, C Y B E R P O P - U P
Vamsee has wide-ranging security
experience, including in sectors such Dr. Christine Izuakor is the CEO of Cyber
as defense, consumer electronics, Pop-up, an on-demand cybersecurity
and automotive. He studied electrical platform powered by vetted cyber
engineering, then focused on cybersecurity freelancers. She has over a decade
during graduate school at Carnegie Mellon. of experience leading cybersecurity
He enjoys working on the latest technologies functions within Fortune 100 companies
and high-impact solutions. and has her PhD in Security Engineering.

4 THE SCHOOL OF C YBERSECURIT Y


Nanodegree Program Overview

Course 1: Enterprise Perimeter and


Network Security
This course is designed to take you through the perspective of an enterprise and how they design a
secure network architecture. The topics in this course will cover current enterprise perimeter and network
security, network security architecture, building an enterprise network, continuous monitoring with a
SIEM, and Zero Trust.

Project Securing the Perimeter

Students will get hands-on experience in building a secure enterprise network. They will segment the
network across different security topologies and employ the principle of least privilege to restrict access
across the various segmentations. Students will then build a VPN to access the enterprise network
from a remote location, then set up a SIEM and a web server. Students will monitor web server logs and
build alerts to help identify security incidents. Students will then write incident response playbooks for
certain attack scenarios. Lastly, students will design a Zero Trust model and write a comparative analysis
between current network architecture and Zero Trust.

5 THE SCHOOL OF C YBERSECURIT Y


Nanodegree Program Overview

LESSON TITLE LEARNING OUTCOMES

• Identify weaknesses in network topologies


NETWORK
• Design the placement of security devices in an enterprise network
SECURITY
ARCHITECTURE • Use the SABSA framework to align enterprise business and
security needs

BUILDING AN • Connect from public to private network over a NAT gateway


ENTERPRISE • Partition a virtual network into multiple segments
NETWORK • Build a VPN solution to connect to an enterprise network

CONTINUOUS • Deploy a SIEM


MONITORING WITH • Set up alerts and monitor traffic
A SIEM • Build an Incident Response Playbook

• Define the principles of Zero Trust


ZERO TRUST • Identify key components in Zero Trust architecture
• Design a Zero Trust model

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Nanodegree Program Overview

Course 2: Enterprise Endpoint Security


With data being a core driver of today’s growth and the number of devices increasing, businesses have
seen a rise in the number of types of endpoints. These factors make enterprise endpoint security
more difficult since there are more potential vulnerable channels of cyberattack, and they have been
compounded by remote work and the growing number of connected devices (i.e. mobile phones, tablets,
etc). Moreover, 89% of security leaders believe that mobile devices will serve as your digital ID to access
enterprise services and data. This course covers best practices for safeguarding the data and workflows
associated with the individual devices that connect to your enterprise network.

Project FedF1rst Security Assessment

You are a security engineer for Fed F1rst Control Systems. Fed F1rst has recently spun out of a larger
organization into a stand-alone company. You have been tasked with implementing the endpoint portion
of the organization’s security policy.

The tasks that follow represent real tasks that would be performed on a scheduled and on an as-needed
basis (for instance, server hardening is typically performed upon installation). You will recommend
hardening strategies on a Windows 10 desktop as well as a Windows 2016 server. In the exercises you
performed during the course, you performed these tasks on a CentOS Linux server. Those skills will come
in handy here.

Next, you will create several security policies for the organization. As with hardening, you also performed
this activity, but for different areas of the Information Technology department areas during the course.

Additionally, you will create build sheets for Windows and Linux cloud servers using the knowledge you
have gained throughout the course.

Finally, you will conduct a subset of a server self-assessment that is common during pre-work for
compliance audits.

7 THE SCHOOL OF C YBERSECURIT Y


Nanodegree Program Overview

LESSON TITLE LEARNING OUTCOMES

• Identify Assets in an Organization


• Recommend mitigation of discovered vulnerabilities
SYSTEM
• Recommend hardening strategy for commonly used
HARDENING
operating systems
• Recommend a security configuration for IoT and Control Systems

• Define BYOD Strategy


POLICIES AND • Create an NDA Policy
COMPLIANCE • Conduct a compliance self-assessment
• Create a remote work policy

• Recommend a public access configuration strategy


CLOUD
• Recommend a configuration for cloud broker
MANAGEMENT
• Recommend a management solution for cloud deployments

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Nanodegree Program Overview

Course 3: Enterprise Wide Application Security


Application security is a critical part of any enterprise security plan. Similar to the application security
course in the Security Engineer Nanodegree, we will be covering how to perform a threat assessment but
will get more granular by doing threat modeling and looking at how to harden applications. This course will
teach students mitigation and defensive strategies in an application software development lifecycle. The
focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the
different ways they enhance their security posture across on prem, cloud, containers, and APIs.

CryptoV4ULT Enterprise Security


Project
Assessment
In this project, the students are the lead security engineers for a newly released application. The
applications backend has recently stood up a new infrastructure to offer new features to its base of over 1
million users. Students will be tasked with reviewing the security for this new application technology stack
and helping identify areas of concern with threat models. After pinpointing vulnerabilities, students will
run scans against the enterprise application and attempt to exploit these potential issues.

Students’ scope includes a variety of entities within the architecture, such as the application itself, the
containers running services, and the external-facing API. Finally, students will create a remediation plan to
help prevent these vulnerabilities and harden your existing security standards.

LESSON TITLE LEARNING OUTCOMES

• Identify all steps of enterprise DevSecOps


DESIGNING SECURITY
• Plan all stages of the SDLC lifecycle
ARCHITECTURE
• Design security architecture with specific constraints

9 THE SCHOOL OF C YBERSECURIT Y


Nanodegree Program Overview

LESSON TITLE LEARNING OUTCOMES

• Conduct threat modeling to identify architecture vulnerabilities


• Identify vulnerabilities and their risk levels
THREAT HUNTING • Run industry-standard application vulnerability scanners with
Nessus
• Create pen-testing roadmap to secure solutions

• Scan containers to identify vulnerabilities


CONTAINER
• Research container vulnerabilities
VULNERABILITIES
• Create plans to mitigate container vulnerabilities

• Identify coding vulnerabilities in APIs


API VULNERABILITIES • Mitigate coding vulnerabilities in APIs
• Apply metrics monitoring

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Nanodegree Program Overview

Course 4: Enterprise Data Security


Cyber threats continue to evolve and grow, and each day we are reminded that all it takes is one lucky strike
for a malicious hacker to breach a company.

On the other hand, cybersecurity professionals have to try and get it right every time to protect a company
from breaches. This means that tackling cyber risk requires a very strategic approach and it starts with
securing one of the greatest assets within the enterprise — data.

To begin mastering data security, during this course we’ll start by exploring the concept of data governance
so that students can build the foundation for understanding, classifying, and protecting data. Students
learn to navigate the variety of compliance regulations that apply to data security and create policies that
prevent unauthorized disclosure of information.

In the bulk of the course, students focus on protecting confidentiality, integrity, and availability of data
through concepts like encryption, auditing, file integrity monitoring, and back-up strategy.

Data Security Analysis in Online


Project Payment Processing

In this project, students will apply the skills they have acquired in this security course to ensure
data security.

Students will be provided a realistic case study, company profile, and resource database. They’ll work
to classify data and justify which regulations apply to the data. They’ll use post-breach evidence to
perform a file integrity monitoring audit and determine if integrity was impacted. Students will also make
recommendations for ensuring data integrity in the future, such as creating a data security policy, mapping
out a data storage architecture and new encryption plan based on the data types, and establishing a
backup and recovery policy and testing it to protect the company in the future. The deliverable will be an
enterprise data security update delivered to the executive team detailing the security program established
within the enterprise. The final implementation of the project will showcase students’ data security
management skills, including their ability to make and justify recommendations to key stakeholders and
implement changes.

11 THE SCHOOL OF C YBERSECURIT Y


Nanodegree Program Overview

LESSON TITLE LEARNING OUTCOMES

• Justify which compliance regulations apply to the data of your


business or industry
• Build data security policy to address compliance requirements
• Determine typical compliance requirements with standard regulations
DATA
• Distinguish appropriate regulations for each data type
GOVERNANCE
• Analyze enterprise data in order to classify data types based on risk.
• Design information rights management policies to prevent intellectual
property theft and stop unauthorized file sharing and editing
• Analyze enterprise data in order to classify data types based on risk.

• Apply the appropriate encryption system for enterprise data at rest


and data in transit
• Demonstrate encryption of data
DATA
• Identify and distinguish methods for determining the right encryption
CONFIDENTIALITY solution for data at rest and data in transit
• Analyze and distinguish encryption types, applications, and
fundamentals (cert authority, PKI, key management)

• Implement data protection and auditing controls that ensure data


integrity across the organization
• Map out a data storage architecture that supports data integrity
and security
DATA INTEGRITY • Conduct an audit to confirm compliance with key security controls
• Distinguish major types of audit
• Execute hashing in order to confirm data integrity
• Apply the principles of identity and access management

• Establish a backup and recovery solution for critical systems across


the organization
• Create a disaster recovery plan
DATA • Run a back-up and restore test in the cloud
AVAILABILITY • Build a backup and recovery strategy
• Justify what data to back up
• Distinguish backup and recovery best practice methods

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Our Nanodegree Programs Include:

Pre-Assessments Dashboard & Progress Reports


Our in-depth workforce assessments Our interactive dashboard (enterprise
identify your team’s current level of management console) allows administrators
knowledge in key areas. Results are used to to manage employee onboarding, track
generate custom learning paths designed course progress, perform bulk enrollments
to equip your workforce with the most and more.
applicable skill sets.

Industry Validation & Reviews Real World Hands-on Projects


Learners’ progress and subject knowledge Through a series of rigorous, real-world
is tested and validated by industry experts projects, your employees learn and
and leaders from our advisory board. These apply new techniques, analyze results,
in-depth reviews ensure your teams have and produce actionable insights. Project
achieved competency. portfolios demonstrate learners’ growing
proficiency and subject mastery.

13 THE SCHOOL OF C YBERSECURIT Y


Our Review Process

Real-life Reviewers for Real-life Projects Vaibhav


Real-world projects are at the core of our Nanodegree programs UDACITY LEARNER
because hands-on learning is the best way to master a new skill.
Receiving relevant feedback from an industry expert is a critical part
of that learning process, and infinitely more useful than that from “I never felt overwhelmed while pursuing the
peers or automated grading systems. Udacity has a network of over Nanodegree program due to the valuable support
900 experienced project reviewers who provide personalized and of the reviewers, and now I am more confident in
timely feedback to help all learners succeed. converting my ideas to reality.”

now at

All Learners Benefit From: CODING VISIONS INFOTECH

Line-by-line feedback Industry tips and Advice on additional Unlimited submissions


for coding projects best practices resources to research and feedback loops

• Go through the lessons and work on the projects that follow


How it Works
• Get help from your technical mentor, if needed
Real-world projects are
• Submit your project work
integrated within the
classroom experience, • Receive personalized feedback from the reviewer
making for a seamless • If the submission is not satisfactory, resubmit your project
review process flow. • Continue submitting and receiving feedback from the reviewer
until you successfully complete your project

About our Project Reviewers


Our expert project reviewers are evaluated against the highest standards and graded based on learners’ progress.
Here’s how they measure up to ensure your success.

900+ 1.8M 3 4.85


/5
Expert Project Projects Reviewed Hours Average Average Reviewer
Reviewers Our reviewers have Turnaround Rating
Are hand-picked extensive experience You can resubmit your Our learners love the
to provide detailed in guiding learners project on the same quality of the feedback
feedback on your through their course day for additional they receive from our
project submissions. projects. feedback. experienced reviewers.

Learn More at WWW.UDACITY.COM/ENTERPRISE ENTERPRISE SECURIT Y


Udacity © 2021

2440 W El Camino Real, #101


Mountain View, CA 94040, USA - HQ

For more information visit: www.udacity.com/enterprise

You might also like