Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Introduction to Cybersecurity

SecurityScoreCard via Udacity Nanodegree


Cybersecurity is a critically important field for businesses in every industry, yet there's projected to be 3.5 million unfilled cybersecurity jobs by 2021. To answer that demand, Udacity has teamed up with the best in the field to teach you the basics of security in our Introduction to Cybersecurity Nanodegree program. In this program, students will learn how to assess threats, respond to security incidents, and implement controls to reduce risk. These skills will then be put to the test as you navigate four different real world projects and graduate with a portfolio that demonstrates your mastery of cybersecurity fundamentals.
Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems.


Prerequisite Knowledge

Basic knowledge of network connectivity and OS fundamentals See detailed requirements.

  • Cybersecurity Foundations

    This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.

    Securing a Business Network  
  • Defending and Securing Systems

    Gain exposure to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field. You will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. You'll also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.

    Monitoring and Securing Douglas Financials Inc.  
  • Threats, Vulnerabilities, and Incident Response

    During this course, you will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks. You'll be able to explain the relationship between threats, threat actors, vulnerabilities, and exploits, leverage the MITRE ATT&CK framework to understand attack methods, and distinguish events from incidents and recognize indicators of compromise.

    Navigating a Cybersecurity Incident  
  • Governance, Risk, and Compliance

    Cybersecurity Governance, Risk, and Compliance (GRC) has rapidly become a critical part of an effective cybersecurity strategy. In this course, students will learn about the functions of Governance, Risk, and Compliance and how each function operates alongside operational controls to strengthen an organization’s security. Students will also learn how to assess control effectiveness, measure security risk, and ensure that organizations are meeting security compliance objectives.

    Create the SwiftTech GRC Program  

Taught by

Ron Woerner, CISSP, CISM, Jerry Smith, Christine Izuakor, PhD, CISSP and Sean Pike, Esq., M.S.

Related Courses


Start your review of Introduction to Cybersecurity

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free