Intro To Cybersecurity Nanodegree Program Syllabus
Intro To Cybersecurity Nanodegree Program Syllabus
SCHOOL OF CYBERSECURITY
Introduction to
Cybersecurity
Nanodegree Program Syllabus
Overview
Cybersecurity is a critically important field for businesses in every industry, especially given the proliferation of data breaches
(more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). To reduce
risk and improve security, businesses are rushing to hire for cybersecurity roles, yet there’s projected to be 3.4 million unfilled
cybersecurity jobs by 2022. The Introduction to Cybersecurity Nanodegree program will equip learners with the foundational
skills to get started in this highly in-demand field.
Learning Objectives
• Evaluate specific security techniques used to administer a system that meets industry standards and core
controls.
• Explain methods for establishing and maintaining the security of a network, computing environment, and
application.
• Conduct threat assessments and vulnerability scans to secure the assets of an organization.
Introduction to Cybersecurity 2
Program information
Prerequisites
Required Hardware/Software
Learners will need a desktop or laptop computer running recent versions of Windows, Mac OS X, or Linux and an unmetered
broadband internet connection.
*The length of this program is an estimation of total hours the average student may take to complete all required
coursework, including lecture and project time. If you spend about 5-10 hours per week working through the program, you
should finish within the time provided. Actual hours may vary.
Introduction to Cybersecurity 3
Course 1
Cybersecurity Foundations
Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security
fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate
specific security techniques used to administer a system that meets industry standards and core controls, assess high-level
risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of
different types of computer systems.
Course Project
What is Cybersecurity • Explain security fundamentals including core security principles, critical security
controls, and best practices.
Introduction to Cybersecurity 4
• Apply methods to enforce cybersecurity governance.
• Describe the process and technique for applying patches and updates on
computing devices.
Introduction to Cybersecurity 5
Course 2
Course Project
Lesson 1 • Explain the NIST 800 framework for defending computer systems.
Defending Computer Systems • Determine if a system has implemented least privileged properly.
& Security Principles • Suggest approaches to correct systems that have inappropriately implemented
least privileged principles.
Introduction to Cybersecurity 6
• Differentiate between different types of firewalls.
Monitoring & Logging • Interpret the output of a firewall and IDS report.
for Detection of
• Explain the importance of a SIEM.
Malicious Activity
• Explain the pros and cons of open source vs. commercial SIEM.
• Define encryption.
Introduction to Cybersecurity 7
Course 3
Course Project
Students will work to identify the type of threat actor involved and potential motivation behind the
attack. Based on clues provided throughout the scenario, students will conduct scans to discover and test
vulnerabilities that could lead to a successful attack. Students will then assess risk levels associated with
the findings and propose a remediation plan. They will also leverage a provided incident response plan to
navigate the potential breach and make recommendations for improvements to the plan.
The final implementation of the project will showcase students’ vulnerability management and incident
response skills, including their ability to prioritize threats and make recommendations to key stakeholders.
Introduction to Cybersecurity 8
• Explain the relationship between threats, threat actors, vulnerabilities,
and exploits.
Lesson 1
• Utilize event context to identify potential threat actor motivations.
Assessing Threats • Identify security threats applicable to important organizational assets.
Introduction to Cybersecurity 9
Course 4
Course Project
• Explain the key functions of each of the Governance, Risk, and Compliance
Lesson 1
(GRC) roles.
Introduction to Governance, • Articulate the connection between GRC roles.
Risk & Compliance
• Demonstrate the importance of cybersecurity GRC in accomplishing
cybersecurity objectives and business goals.
Introduction to Cybersecurity 10
• Understand reliance on governance professionals to align business and
security strategy.
Lesson 3 • Remediate risk and report risk measurement and remediation activities to
senior leadership.
Risk
• Develop and interpret risk statements.
Lesson 4 • Locate and assess relevant sources of compliance for your organization.
Introduction to Cybersecurity 11
Meet your instructors.
Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered
by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions
within Fortune 100 companies and has her PhD in security engineering.
Jerry Smith
Information Security Engineer
Jerry is a member of the security operations center for the University of Alabama at
Birmingham, where he is the lead threat hunter and a member of the firewall team. Previously
he was an information security engineer for Hibbett Sporting Goods.
Ron Woerner is a noted consultant, speaker and writer in the security industry. As chief
security evangelist at Cyber-AAA, LLC, he delivers training and security risk assessments for
small, medium, and large organizations. Woerner also teaches at Bellevue University, an NSA
Center of Academic Excellence.
Sean Pike is a cybersecurity and GRC leader with 20+ years of experience leading cybersecurity
initiatives in regulated companies. Mr. Pike works with organizations to develop unique, proactive
security solutions that follow stringent security principles while accelerating business.
Introduction to Cybersecurity 12
Udacity’s learning
experience
Introduction to Cybersecurity 13
Our proven approach for building
job-ready digital skills.
Experienced Project Reviewers
• Project review cycle creates a feedback loop with multiple opportunities for
improvement—until the concept is mastered.
• Project reviewers leverage industry best practices and provide pro tips.
• Unlimited access to mentors means help arrives when it’s needed most.
• 2 hr or less average question response time assures that skills development stays on track.
Empower job-readiness.
• Access to a Github portfolio review that can give you an edge by highlighting your
strengths, and demonstrating your value to employers.*
• Get help optimizing your LinkedIn and establishing your personal brand so your profile
ranks higher in searches by recruiters and hiring managers.
Mentor Network
• Mentors work across more than 30 different industries and often complete a Nanodegree
program themselves.
Introduction to Cybersecurity 14
Learn more at
www.udacity.com/online-learning-for-individuals →
12.02.22 | V1.0