Академический Документы
Профессиональный Документы
Культура Документы
Cybersecurity Nanodegree Syllabus
Become a security engineer
Course 1: Introduction
Get an overview of your program. Meet your instructors, and learn about the projects you'll build. Then, get started by
launching a server instance in the cloud.
Lesson 1: Welcome
Lesson 2: Learning Journey
Lesson 3: Introduction to Cloud Infrastructure
Project 1: Cloud Infrastructure Primer
You will warm up with cloud infrastructure by manually setting up a virtual server with security groups and SSH to
create an Apache server that serves HTML code the world!
Course 2: Fundamentals
Explore the fundamental building blocks of cybersecurity. Learn how networks handle routing, DNS, loadbalancing, and
more. Learn the Linux operating system, and review programming and APIs. Start building cloud infrastructure.
Lesson 1: Networking
Lesson 2: Systems
Lesson 3: Programming
Lesson 4: APIs
Lesson 5: Modern Cloud Infrastructure
Project 2: Advanced Cloud Infrastructure
In this project you will use Terraform and infrastructureascode, to build upon an entire cloud environment that is
the basis of a usable full stack application that will expose a web frontend and functional APIs. All the
components necessary to create a basic secure platform are found here: frontend servers, databases, bastions,
loadbalancers, and everything in between including security groups for proper segmentation.
Project 3: Detect and autoremediate cloud misconfigurations
Build a system that will be able to automatically detect and rectify security misconfigurations in a cloud
environment. Learn to detect gaps in security between what specifications should exist and what is currently
there. Learn to effectively respond to these gaps, and neutralize existing threat vectors.
Design and deploy pervasive, applicationlayer encryption leveraging key management systems and
applicationbased authorizations, amongst other applicationsecurity challenges.
TERM 2: SECURITY MONITORING & ANALYTICS
The best systems can still be vulnerable, so it is critical that security engineers are adept at handling issues
when they happen, and know how to use data from past breaches to prevent future ones. In this term, you’ll
focus on monitoring and responding, and leveraging beneficial analytics.
Design and deploy a system that will aggregate security events. This system will store, analyze, and be able to
alert the necessary people when a security event occurs. The system will be able to collect events from multiple
sources.
Course 6: Analytics
Learn to eliminate monitoring confusion by analyzing data to derive useful insights—do this with both network and
applicationbased data sets.
Lesson 1: Core Concepts and Tools
Lesson 2: Network Security UseCase
Lesson 3: Application Security UseCase
Lesson 4: Endpoint Security UseCase
Project 6: Using Analytics to Detect Security Issues
Leverage different analytics frameworks to detect security issues at multiple levels in your infrastructure, including
network, application, and endpoints. Use these frameworks to display the overall health and security of your
infrastructure and applications.
Course 7: Capstone
In this final course, you will be putting all of the pieces together in a final project. You will team up with your fellow
classmates to attack and defend a cloud production environment.
Lesson 1: Project Prep
Project 7: Red vs. Blue
Team up with your fellow classmates to participate in a Red (attackers) vs. Blue (defenders) team exercise. This
will involve attacking and defending a cloud production environment.