Udacity part of Accenture logo

Defending and Securing Systems

Explore how layered defenses transform cybersecurity. Apply cryptography, firewalls, and monitoring tools to detect intrusions, secure networks, and design mitigation strategies that keep data safe across complex digital environments.

  • Course
  • Beginner
  • 16 hours
  • Updated: Oct 7, 2025

Subscription · Monthly

  • Cancel Anytime
  • Unlimited access to hundreds of top-rated courses
  • Hands-on projects with expert feedback
  • Personalized career coaching and interview prep
  • Program Certificates

Skills you'll learn

14 skills

  • Cryptography
  • Security information and event management
  • Systems security
  • Security assessment
  • Intrusion protection systems

Prerequisites

1 prerequisite

Prior to enrolling, you should have the following knowledge:

  • Command line interface basics

You will also need to be able to communicate fluently and professionally in written and spoken English.

Course Outline

  • 6 lessons
  • 1 project

Program Instructors

1 instructor

Unlike typical professors, our instructors come from Fortune 500 and Global 2000 companies and have demonstrated leadership and expertise in their professions:

Jerry Smith

Information Security Engineer

Jerry Smith

Information Security Engineer

Subscription · Monthly

  • Cancel Anytime
  • Unlimited access to hundreds of top-rated courses
  • Hands-on projects with expert feedback
  • Personalized career coaching and interview prep
  • Program Certificates

Other programs you might like:

Udacity Accenture logo

Company

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

© 2011-2026 Udacity, Inc. "Nanodegree" is a registered trademark of Udacity. © 2011-2026 Udacity, Inc.
We use cookies and other data collection technologies to provide the best experience for our customers.