UDACITY
UDACITY Logo

Defending and Securing Systems 

  • Offered byUDACITY

Defending and Securing Systems
 at 
UDACITY 
Overview

Equip yourself with the expertise needed to thrive in the cybersecurity. Enroll now to develop the skills for defending and securing cybersecurity systems

Duration

3 weeks

Total fee

69,700

Mode of learning

Online

Difficulty level

Beginner

Official Website

Go to Website External Link Icon

Credential

Certificate

Defending and Securing Systems
 at 
UDACITY 
Highlights

  • Earn a certificate from Udacity
  • Flexible learning program
  • Technical mentor support
  • Practical tips and industry best practices
  • Unlimited submissions and feedback loops
  • Additional suggested resources to improve
Read more
Details Icon

Defending and Securing Systems
 at 
UDACITY 
Course details

What are the course deliverables?
  • In this lesson you will learn about best practices in defending computer systems
  • In this lesson you will learn how to secure networks
  • In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity
  • In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files
More about this course
  • In this course, students will be exposed to a diverse group of technologies that will provide or enhance the skills needed to enter the cybersecurity field
  • Students will apply best practices of Defense in Depth to secure computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities
  • Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit

Defending and Securing Systems
 at 
UDACITY 
Curriculum

Introduction to Defending and Securing Systems

Defending Computer Systems and Security Principles

System Security: Securing Networks

Monitoring and Logging for Detection of Malicious Activity

Cryptography Basics (Applied Cryptography)

Project: Monitoring and Securing the DFI Environment

Defending and Securing Systems
 at 
UDACITY 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by UDACITY

Free
6 weeks
Beginner
– / –
4 months
Intermediate
Free
4 weeks
Intermediate
Free
1 hours
Beginner
View Other 435 CoursesRight Arrow Icon
qna

Defending and Securing Systems
 at 
UDACITY 

Student Forum

chatAnything you would want to ask experts?
Write here...