Course 1: Welcome to the Enterprise Security Nanodegree Program 45 minutesAn Introduction to Your Nanodegree ProgramWelcome! We're so glad you're here. Join us in learning a bit more about what to expect and ways to succeed.Getting HelpYou are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.Course 2: Enterprise Perimeter and Network Security Refine your network security expertise by designing scalable architectures in Azure. Apply Zero Trust principles and configure SIEM monitoring to strengthen enterprise defenses and detect vulnerabilities proactively.20 hoursIntroduction to Enterprise Perimeter and Network SecurityIn this introductory lesson, we'll give you a helpful overview of the course that will set you up for success!Network Security ArchitectureIn this lesson we'll provide you an introduction to network security architecture for enterprise.Building an Enterprise NetworkIn this lesson we are going to take all the concepts we learned from Network Security Architecture and use them to build our own secure enterprise network in Microsoft Azure.Continuous Monitoring with a SIEMIn this lesson we'll learn how to set up continuous monitoring for our enterprise network through the use of a SIEM.Zero TrustIn this lesson we'll introduce you to a new school of thought in how enterprises should best secure their network - Zero Trust.Project: Securing the PerimeterIn this project, you'll design a secure network architecture for a simulated business context, build that design in Azure, set up monitoring with a SIEM, and create a Zero Trust Model.Course 3: Enterprise Endpoint Security In this course, you will learn about how to craft Enterprise level Endpoint security policies and hardening strategies. 16 hoursIntroduction to Enterprise Endpoint SecurityThis is the welcome lesson to Enterprise Endpoint Security. Here you'll get a quick overview of what we'll cover in the course. System HardeningIn this lesson, you will learn how to develop a hardening strategy to ensure the security of endpoints across all enterprise-owned devices.Policies and ComplianceIn this lesson, you will build security policies that implement compliance requirements to secure enterprise devices and data using industry best practices.Cloud ManagementIn this lesson, you will use best practices to create automated Cloud Endpoint Security procedures.Project: FedF1rst Security AssessmentThis is the project lesson for this course. Here you will complete and submit your project for this course. Course 4: Enterprise-Wide Application Security Application security is a critical part of any enterprise security plan. We will be cover how to perform a threat assessment by doing threat modeling and pen testing. This course will teach mitigation and defensive strategies in an application software development lifecycle. The focus will be on covering how enterprises bake security into their lifecycle by shifting security left and the different ways they enhance their security posture across on-premise, cloud, containers, and APIs. 18 hoursIntroduction to Enterprise-Wide Application SecurityThis is the welcome lesson to Enterprise-Wide Application Security. Here you'll get a quick overview of what we'll cover in the course. Designing Security ArchitectureDesigning security architecture is the first phase, where you set the teams and architecture. You will learn about DevSecOps, SDLC, and security architecture in this lesson.Threat HuntingIn the threat hunting phase, you will proactively find security issues in the product. You will learn about threat modeling, identify vulnerabilities, vulnerability scanning, and pen test roadmap.Container VulnerabilitiesIn this lesson, you will scan containers, research container vulnerabilities, and mitigate container vulnerabilities, so that you can better handle the actual deployment and cloud infrastructure.API VulnerabilitiesAPI service is what the end-users will finally use. In this lesson, you will identify coding vulnerabilities, mitigate coding vulnerabilities, and learn about monitoring and analytics.CryptoV4ULT Enterprise Security Assessment ProjectIn this project, you will become the lead security architect for a new startup’s web application and be tasked to identify vulnerabilities and creating a roadmap for mitigation. Course 5: Data Security Start preparing for a data-driven career in cybersecurity. Learn to classify and protect data, apply encryption, audit systems, and design strategies that prevent unauthorized access and data loss. 14 hoursIntroduction to Data SecurityThis lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.Data GovernanceData governance is about understanding the data in your organization, its importance, who owns it, and where it exists. This enables you to effectively manage and secure it. Data ConfidentialityIn order to protect data from unauthorized access, you will need to know how to map out a storage architecture and then apply the appropriate encryption for both data at rest and in transit.Data IntegrityIn order to ensure data is trustworthy within the organization, you will need to understand information rights management, access control, file integrity, and auditing.Data AvailabilityThrough planned incident response, disaster recovery, business continuity, and backup strategy, organizations can ensure data is available when needed. Data Security Analysis in Online Payment ProcessingYou’ll spend a day in the life of a data security professional going through the process of establishing and implementing data security controls.Course 6: Congratulations! Congratulations on finishing your program!10 minutesCongratulations!Congratulations on your graduation from this program! Please join us in celebrating your accomplishments.CompanyAbout Us Why Udacity? Blog In the News Jobs at Udacity Become a Mentor Partner with Udacity ResourcesCatalog Career Outcomes Help and FAQ Scholarships Resource Center Udacity SchoolsSchool of Artificial Intelligence School of Autonomous Systems School of Business School of Cloud Computing School of Cybersecurity School of Data Science School of Executive Leadership School of Product Management School of Programming and Development Career Resources Featured ProgramsBusiness Analytics SQL AWS Cloud Architect Data Analyst Intro to Programming Digital Marketing Self Driving Car Engineer Only at UdacityArtificial Intelligence Deep Learning Digital Marketing Flying Car and Autonomous Flight Engineer Intro to Self-Driving Cars Machine Learning Engineer Robotics Software Engineer