Nanodegree key: nd545
Version: 6.3.13
Locale: en-us
更多新课➕wx:udacity6In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.
Content
Part 01 : Welcome to the Nanodegree Program
-
Module 01: Welcome to the Nanodegree Program
-
Lesson 02: Getting Help
You are starting a challenging but rewarding journey! Take 5 minutes to read how to get help with projects and content.
Part 02 : Cybersecurity Foundations
Security is embedded in all we do online and is a critical job skill and career field. This foundations course explains security fundamentals including core principles, critical security controls, and cybersecurity best practices. Students will also evaluate specific security techniques used to administer a system that meets industry standards and core controls, assess high-level risks, vulnerabilities, and attack vectors of a sample system, and explain ways to establish and maintain the security of different types of computer systems.
-
Module 01: Cybersecurity Foundations
-
Lesson 01: Welcome to Cybersecurity Fundamentals
In this lesson, you will be given an overview of the course.
- Concept 01: Meet your Instructor
- Concept 02: Course Outline
- Concept 03: Lesson Outline
- Concept 04: Prerequisites
- Concept 05: Introduction to Cybersecurity
- Concept 06: Cybersecurity and You
- Concept 07: Business stakeholders
- Concept 08: History of Cybersecurity
- Concept 09: Tools & Environment
- Concept 10: Introducing Cloud Labs
- Concept 11: Cloud Lab - Terms of Use
- Concept 12: Cloud Lab - CYBERND01PRJ01
- Concept 13: Project: Cybersecurity Fundamentals
- Concept 14: Lesson Conclusion
-
Lesson 02: What is Cybersecurity
In this lesson, you will learn the security trend and how to develop a career in cybersecurity.
- Concept 01: Introduction
- Concept 02: Cybersecurity Overview
- Concept 03: The Security Mindset
- Concept 04: Lesson Outline
- Concept 05: Security Trends
- Concept 06: Security Trends Quizzes
- Concept 07: Security Trends Exercise
- Concept 08: Security Trends Exercise Solution
- Concept 09: Cybersecurity Careers
- Concept 10: Cybersecurity Careers Quizzes
- Concept 11: Cybersecurity Careers Exercise
- Concept 12: Cybersecurity Careers Exercise Solution
- Concept 13: Security Principles
- Concept 14: Security Principles Quizzes
- Concept 15: Security Best Practices
- Concept 16: Security Best Practice Quizzes
- Concept 17: Security Best Practice Exercise
- Concept 18: Security Best Practice Exercise Solution
- Concept 19: Lesson Conclusion
-
Lesson 03: Maintain a Secure Infrastructure
In this lesson, you will learn some cybersecurity laws and some basics about security governance, compliance, and regulations.
- Concept 01: Introduction
- Concept 02: Rules Governing Cybersecurity
- Concept 03: Lesson Outline
- Concept 04: Governance and Compliance
- Concept 05: Governance and Compliance Quizzes
- Concept 06: Governance and Compliance Exercise
- Concept 07: Governance and Compliance Exercise Solution
- Concept 08: Intro to Security Regulations
- Concept 09: Intro to Security Regulations Quizzes
- Concept 10: Intro to Security Regulations Exercise
- Concept 11: Intro to Security Regulations Exercise Solution
- Concept 12: NIST Cybersecurity Framework
- Concept 13: NIST Cybersecurity Framework Quizzes
- Concept 14: NIST Cybersecurity Framework (CSF) Exercise
- Concept 15: NIST Cybersecurity Framework Exercise Solution
- Concept 16: Center for Internet Security Controls
- Concept 17: Center for Internet Security Controls Quizzes
- Concept 18: Center for Internet Security Controls Exercise
- Concept 19: Center for Internet Security Controls Exercise Solution
- Concept 20: Lesson Conclusion
-
Lesson 04: Think Like a Hacker
In this lesson, you will learn the hacking lifecycle and the basics of vulnerability, threat, and attack.
- Concept 01: Introduction
- Concept 02: Lesson Outline
- Concept 03: Hacker Process
- Concept 04: Hacking Lifecycle
- Concept 05: Hacking Lifecycle Quizzes
- Concept 06: Hacking Lifecycle - Exercise Part 1
- Concept 07: Hacking Lifecycle - Exercise Part 2
- Concept 08: Vulnerability Management
- Concept 09: Vulnerability Management Quizzes
- Concept 10: Identifying Software Vulnerabilities Exercise
- Concept 11: Identifying Vulnerabilities Exercise Solution
- Concept 12: Introduction to Threats, Attacks, and Exploits
- Concept 13: Introduction to Threats, Attacks, and Exploits Quizzes
- Concept 14: Introduction to Threats, Attacks, and Exploits Exercise
- Concept 15: Introduction to Threats, Attacks, and Exploits Solution
- Concept 16: Lesson Conclusion
-
Lesson 05: Security Defenses
In this lesson, you will learn some basic methods to keep your computer and network safe.
- Concept 01: Introduction
- Concept 02: Establishing Security Defenses
- Concept 03: Lesson Outline
- Concept 04: Layering Protection
- Concept 05: Layering Protection Quizzes
- Concept 06: Layering Protection Exercise
- Concept 07: Layering Protection Exercise Solution
- Concept 08: Identity and Access Control
- Concept 09: Identity and Access Control Quizzes
- Concept 10: Identity and Access Control Exercise
- Concept 11: Identity and Access Control Exercise Solution
- Concept 12: Patching & Updating
- Concept 13: Patching & Updating Quizzes
- Concept 14: Patching & Updating Exercise
- Concept 15: Patching & Updating Exercise Solution
- Concept 16: Web and Email Security
- Concept 17: Web and Email Security Quizzes
- Concept 18: Web and Email Security Exercises
- Concept 19: Web and Email Security Solutions
- Concept 20: Lesson Conclusion
-
Lesson 06: Applying Cybersecurity
In this lesson, you will practice applying cybersecurity to many situations.
- Concept 01: Introduction
- Concept 02: Applying Cybersecurity
- Concept 03: Lesson Outline
- Concept 04: Identify Existing Assets and Security Controls
- Concept 05: Identify Existing Assets and Security Controls Quizzes
- Concept 06: Identify Existing Assets and Security Controls Exercise
- Concept 07: Cloud Lab - CYBERND01PRJ01
- Concept 08: Identify Existing Assets and Security Controls Solution
- Concept 09: Analyze Vulnerabilities and Threats
- Concept 10: Analyze Vulnerabilities and Threats Quizzes
- Concept 11: Analyze Vulnerabilities and Threats Exercise
- Concept 12: Analyze Vulnerabilities and Threats Exercise Solution
- Concept 13: Recommend and Apply Basic Security Controls
- Concept 14: Recommend and Apply Basic Security Controls Quizzes
- Concept 15: Recommend and Apply Basic Security Controls Exercise
- Concept 16: Recommend and Apply Basic Security Controls Solution
- Concept 17: Communicate Risks Exercise
- Concept 18: Communicate Risks Exercise Solution
- Concept 19: Lesson Conclusion
- Concept 20: Recap of Course
- Concept 21: Congratulations
-
Lesson 07: Project: Securing a Business Network
In this project, you will apply the skills you have learned in this course to secure a business network.
-
Part 03 : Defending and Securing Systems
In this course, students will be exposed to a diverse group of technologies that will provide or enhance the
skills needed to enter the cybersecurity field. Students will apply best practices of Defense in Depth to secure
computer systems, use outputs from security incidents to analyze and improve future network security, and search internal systems to determine network vulnerabilities. Students will also learn how to recommend mitigations to address common application vulnerabilities and ensure fundamental encryption techniques for securing data at rest and in transit.
-
Module 01: Defending and Securing Systems
-
Lesson 01: Introduction to Defending and Securing Systems
Course introduction to Introduction to Defending and Securing Systems
- Concept 01: Meet Your Instructor
- Concept 02: Prerequisites
- Concept 03: Introduction to Defending and Securing Systems
- Concept 04: Defending and Securing Systems Is Important
- Concept 05: Defending and Securing Systems Stakeholders
- Concept 06: History of Defending and Securing Systems
- Concept 07: Course Outline
- Concept 08: Tools, Environment & Dependencies
- Concept 09: Cloud Lab - Terms of Use
- Concept 10: Cloud Lab - CYBERND0204 - Windows Server 2016
- Concept 11: Cloud Lab - CYBERND0205 - Linux (CentOS)
- Concept 12: Project: Monitoring and Securing the DFI Environment
- Concept 13: Good Luck!
-
Lesson 02: Defending Computer Systems and Security Principles
In this lesson you will learn about best practices in defending computer systems.
- Concept 01: Introduction to Defending Computer Systems And Security Principles
- Concept 02: Defense in Depth
- Concept 03: Defending Computer Systems And Security Principles
- Concept 04: Defense in Depth Introduction
- Concept 05: Quizzes: Defense in Depth Introduction
- Concept 06: Exercise: Defense in Depth Introduction
- Concept 07: Exercise Solution: Defense in Depth Introduction
- Concept 08: NIST 800 Framework
- Concept 09: NIST 800 Quizzes
- Concept 10: NIST 800 Exercise
- Concept 11: NIST 800 Exercise Solution
- Concept 12: Principle of Least Privileged
- Concept 13: Least Privileged Quizzes
- Concept 14: Least Privileged Exercise
- Concept 15: Least Privileged Exercise Solution
- Concept 16: When do these policies not apply
- Concept 17: Lesson Conclusion
-
Lesson 03: System Security: Securing Networks
In this lesson you will learn how to secure networks.
- Concept 01: System Security: Securing Networks
- Concept 02: Get the Foundation
- Concept 03: System Security: Securing networks
- Concept 04: Firewalls
- Concept 05: Firewalls Quizzes
- Concept 06: Automated Threat Intelligence
- Concept 07: Quizzes: Automated Threat Intelligence
- Concept 08: Firewalls Exercise
- Concept 09: Exercise Solution: Firewalls
- Concept 10: Wireless
- Concept 11: Wireless Quizzes
- Concept 12: Wireless Exercise
- Concept 13: Wireless Exercise Solution
- Concept 14: IDS/IPS Systems
- Concept 15: IDS/IPS Quizzes
- Concept 16: IDS/IPS Exercise
- Concept 17: IDS/IPS Exercise Solution
- Concept 18: Securing Windows at the OS Level
- Concept 19: Quizzes: Securing Windows at the OS Level
- Concept 20: Updating Windows
- Concept 21: Quizzes: Updating Windows
- Concept 22: Exercise: Securing Windows at the OS Level
- Concept 23: Cloud Lab - CYBERND0204 - Windows Server 2016
- Concept 24: Exercise Solution: Securing Windows at the OS Level
- Concept 25: Securing Linux at the OS Level
- Concept 26: Quizzes: Securing Linux at the OS Level
- Concept 27: Updating Linux
- Concept 28: Quizzes: Updating Linux Quizzes
- Concept 29: Exercise: Securing Linux at the OS Level
- Concept 30: Cloud Lab - CYBERND0205 - Linux (CentOS)
- Concept 31: Exercise Solution: Securing Linux at the OS Level
- Concept 32: Not Installing updates
- Concept 33: System Security: Securing Networks Lesson Conclusion
-
Lesson 04: Monitoring and Logging for Detection of Malicious Activity
In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
- Concept 01: Monitoring and Logging for Detection of Malicious Activity Lesson Introduction
- Concept 02: Monitoring and Logging Overview
- Concept 03: Monitoring and Logging for Detection of Malicious Activity
- Concept 04: System Event Logs
- Concept 05: Quizzes: System Event Logs
- Concept 06: Exercise: System Event Logs
- Concept 07: Cloud Lab - CYBERND0205
- Concept 08: Cloud Lab - CYBERND0204
- Concept 09: Exercise Solution: System Event Logs
- Concept 10: Monitoring Network Traffic
- Concept 11: Quizzes: Monitoring Network Traffic
- Concept 12: Exercise: Monitoring Network Traffic
- Concept 13: Exercise Solution: Monitoring Network Traffic
- Concept 14: SIEM Framework
- Concept 15: Quizzes: SIEM
- Concept 16: Exercise: SIEM
- Concept 17: Exercise Solution: SIEM
- Concept 18: When is an alert not an alert?
- Concept 19: Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion
-
Lesson 05: Cryptography Basics (Applied Cryptography)
In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
- Concept 01: Cryptography Basics
- Concept 02: Cryptography Overview
- Concept 03: Cryptography Basics (Applied Cryptography)
- Concept 04: Introduction to Encryption
- Concept 05: Quizzes: Introduction to Encryption
- Concept 06: Exercise: Introduction to Encryption
- Concept 07: Exercise Solution: Introduction to Encryption
- Concept 08: Encryption in Transit
- Concept 09: Quizzes: Encryption in Transit
- Concept 10: Exercise: Encryption in Transit
- Concept 11: Cloud Lab - CYBERND0205
- Concept 12: Cloud Lab - CYBERND0204
- Concept 13: Exercise Solution: Encryption in Transit
- Concept 14: File Hashes/Digital Signatures
- Concept 15: Quizzes: File Hashes/Digital Signatures
- Concept 16: Exercise: File Hashes/Digital Signatures
- Concept 17: Exercise Solution: File Hashes/Digital Signatures
- Concept 18: When Encryption is not a Good idea
- Concept 19: Exercise: Cryptography Basics Final
- Concept 20: Cryptography Basics (Applied Cryptography) Lesson Conclusion
- Concept 21: Course Recap
-
Lesson 06: Project: Monitoring and Securing the DFI Environment
This lesson is the project lesson for Defending and Securing Systems course.
Project Description - Monitoring and Securing the DFI Environment
Project Rubric - Monitoring and Securing the DFI Environment
-
Part 04 : Threats, Vulnerabilities, and Incident Response
Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand the threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.
-
Module 01: Threats, Vulnerabilities, and Incident Response
-
Lesson 01: Intro to Threats, Vulnerabilities, and Incident Response
Meet your instructor, discuss what you'll learn in this course, major stakeholders and a brief history, and a peek at the final project!
- Concept 01: Meet Your Instructor
- Concept 02: Course Outline
- Concept 03: Prerequisites
- Concept 04: Intro to Threats, Vulnerabilities, and Incident Response
- Concept 05: Threats, Vulnerabilities, and Incident Response Is Important
- Concept 06: Stakeholders
- Concept 07: Do's and Don'ts
- Concept 08: History of Threats, Vulnerabilities, and Incident Response
- Concept 09: Tools, Environment & Dependencies
- Concept 10: Cloud Lab - Terms of Use
- Concept 11: Cloud Lab - CYBERND0302
- Concept 12: Project
- Concept 13: Let's Recap!
- Concept 14: Good Luck!
-
Lesson 02: Assessing Threats
This lesson will cover threats and vulnerabilities, attack types, threat motivations, threats to organizations, and threat responses.
- Concept 01: Lesson Overview
- Concept 02: Managing and Prioritizing Risks
- Concept 03: Threats
- Concept 04: Threat Assessment Fundamentals
- Concept 05: Quiz: Threat Assessment Fundamentals
- Concept 06: Exercise: Threat Assessment Fundamentals
- Concept 07: Exercise Solution: Threat Assessment Fundamentals
- Concept 08: Threat and Attack Types
- Concept 09: Quiz: Threat and Attack Types
- Concept 10: Exercise: Threat and Attack Types
- Concept 11: Exercise Solution: Threat Assessment Fundamentals
- Concept 12: Threat Actors and Motivations
- Concept 13: Quiz: Threat Actors and Motivations
- Concept 14: Exercise: Threat Actors and Motivations
- Concept 15: Exercise Solution: Threat Actors and Motivations
- Concept 16: Organizing and Executing Threat Assessments
- Concept 17: Quiz: Organizing and Executing Threat Assessments
- Concept 18: Exercise: Organizing and Executing Threat Assessments
- Concept 19: Solution: Organizing and Executing Threat Assessments
- Concept 20: Lesson Recap
-
Lesson 03: Finding Security Vulnerabilities
In this lesson, we'll be discussing attack methods, scanning for vulnerabilities, and penetration testing.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Finding Vulnerabilities
- Concept 04: Understanding Attack Methods
- Concept 05: Quiz: Understanding Attack Methods
- Concept 06: Exercise: Understanding Attack Methods
- Concept 07: Exercise Solution: Understanding Attack Methods
- Concept 08: Understanding Testing Methods and Tools
- Concept 09: Quiz: Understanding Testing Methods and Tools
- Concept 10: Exercise: Understanding Testing Methods and Tools
- Concept 11: Exercise Solution: Understanding Testing Methods and Tools
- Concept 12: Vulnerability Scanning
- Concept 13: Quiz: Vulnerability Scanning
- Concept 14: Exercise: Vulnerability Scanning
- Concept 15: Exercise Solution: Vulnerability Scanning
- Concept 16: Penetration Testing
- Concept 17: Hashcat Tutorial
- Concept 18: Quiz: Penetration Testing
- Concept 19: Exercise: Penetration Testing
- Concept 20: Exercise Solution: Penetration Testing
- Concept 21: Lesson Recap
-
Lesson 04: Fixing Security Vulnerabilities
We're going to cover how to conduct vulnerability research, test and apply results, and how to prioritize and strategize the results in this lesson.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Fixing Vulnerabilities
- Concept 04: Remediation Planning Fundamentals
- Concept 05: Quiz: Remediation Planning Fundamentals
- Concept 06: Exercise: Remediation Planning Fundamentals
- Concept 07: Exercise Solution: Remediation Planning Fundamentals
- Concept 08: Researching and Validating Findings
- Concept 09: Quiz: Research and Validating Findings
- Concept 10: Exercise: Researching and Validating Findings
- Concept 11: Exercise Solution: Researching and Validating Findings
- Concept 12: Prioritizing Findings
- Concept 13: Quiz: Prioritizing Findings
- Concept 14: Exercise: Prioritizing Findings
- Concept 15: Exercise Solution: Prioritizing Findings
- Concept 16: Recommending Remediation Strategies
- Concept 17: Quiz: Recommending Remediation Strategies
- Concept 18: Exercise: Recommending Remediation Strategies
- Concept 19: Exercise Solution: Recommending Remediation Strategies
- Concept 20: Lesson Recap
-
Lesson 05: Preparing for Inevitable Attacks
Finally, we're going to cover incidents and recovery, events and incidents, the response lifecycle, and roles and response plans.
- Concept 01: Lesson Overview
- Concept 02: Overview
- Concept 03: Preparing for Attacks
- Concept 04: Contingency Planning Fundamentals
- Concept 05: Contingency Planning Fundamentals Quiz
- Concept 06: Incident Response Life Cycle
- Concept 07: Incident Response Life Cycle Quiz
- Concept 08: Exercise: Incident Response Life Cycle
- Concept 09: Exercise Solution: Incident Response Life Cycle
- Concept 10: Incident Response Planning
- Concept 11: Incident Response Planning Quiz
- Concept 12: Exercise: Incident Response Planning
- Concept 13: Digital Forensics
- Concept 14: Digital Forensics Quiz
- Concept 15: Exercise: Digital Forensics
- Concept 16: Exercise Solution: Digital Forensics
- Concept 17: Lesson Recap
- Concept 18: Course Overview
-
Lesson 06: Project: Navigating a Cybersecurity Incident
During the project, you'll summarize and profile a cyber threat, conduct a vulnerability scan, research, analyze and prioritize vulnerabilities, and finally - document incident response actions.
-
Part 05 : Governance, Risk, and Compliance
-
Module 01: Governance, Risk, and Compliance
-
Lesson 01: GRC Overview
In this lesson, we’ll be outlining the basic course structure and discussing the prerequisites that you should possess before taking the course.
-
Lesson 02: Introduction to Governance, Risk, and Compliance
During this lesson, we will lay the groundwork for the rest of the course by developing a definition for Security GRC and briefly introducing how GRC roles function today.
- Concept 01: Lesson Introduction
- Concept 02: Introduction to Governance, Risk, and Compliance
- Concept 03: Overview
- Concept 04: Quiz: Overview
- Concept 05: Security Governance, Risk, and Compliance
- Concept 06: Quiz: Security Governance, Risk, and Compliance
- Concept 07: Security Controls
- Concept 08: Defining GRC Roles
- Concept 09: Quiz: Defining GRC Roles
- Concept 10: Defining GRC Roles Exercise
- Concept 11: Defining GRC Roles Exercise Solution
- Concept 12: GRC Interrelation
- Concept 13: Quiz: GRC Interrelation
- Concept 14: GRC Interrelation Exercise
- Concept 15: GRC Interrelation Exercise Solution
- Concept 16: Interpreting Organizational Needs
- Concept 17: Quiz: Interpreting Organizational Needs
- Concept 18: Interpreting Organizational Needs Exercise
- Concept 19: Lesson Recap
-
Lesson 03: Governance
This lesson focuses on the role of security governance. This is what puts the “G” in GRC.
- Concept 01: Lesson Overview
- Concept 02: Governance Overview
- Concept 03: Quiz: Governance Overview
- Concept 04: Strategic Thinking
- Concept 05: Exercise: Strategic Thinking
- Concept 06: Exercise Solution: Strategic Thinking
- Concept 07: Championing Security
- Concept 08: Quiz: Championing Security
- Concept 09: Exercise: Championing Security
- Concept 10: Exercise Solution: Championing Security
- Concept 11: Designing Measurement
- Concept 12: Quiz: Designing Measurement
- Concept 13: Measurement and Reporting
- Concept 14: Quiz: Measurement and Reporting
- Concept 15: Exercise: Measurement and Reporting
- Concept 16: Policy and Procedure Management
- Concept 17: Quiz: Policy and Procedure
- Concept 18: Exercise: Policy and Procedure Management
- Concept 19: Exercise Solution: Policy and Procedure Management
- Concept 20: Lesson Recap
-
Lesson 04: Risk
In this lesson we’ll learn how risk management has evolved over time into today’s security risk management practice and explore some of the tools risk managers use.
- Concept 01: Lesson Overview
- Concept 02: Risk Overview
- Concept 03: Quiz: Risk Overview
- Concept 04: # Measuring Security Risk
- Concept 05: Quiz: Measuring Security Risk
- Concept 06: Risk Statements
- Concept 07: Quiz: Risk Statements
- Concept 08: Risk Management Framework Example - NIST
- Concept 09: Quiz: Risk Management Framework Example - NIST
- Concept 10: Risk Management Framework Example - FAIR
- Concept 11: Quiz: Risk Management Framework Example - FAIR
- Concept 12: Exercise: Risk Mgmt. Frameworks
- Concept 13: Frameworks in Practice
- Concept 14: Quiz: Frameworks in Practice
- Concept 15: Exercise: Frameworks in Practice
- Concept 16: Identifying Systems and Associated Risks
- Concept 17: Quiz: Identifying Systems and Associated Risks
- Concept 18: Exercise: Identifying Systems and Associated Risks
- Concept 19: Risk Treatment
- Concept 20: Exercise: Risk Treatment
- Concept 21: Risk Registers
- Concept 22: Quiz: Risk Registers
- Concept 23: POAMs and Other Risk Treatment Documentation
- Concept 24: Quiz: POAMs and Other Risk Treatment Documentation
- Concept 25: Exercise: Developing a Mitigation Plan
- Concept 26: Exercise Solution: Developing a Mitigation Plan
- Concept 27: Lesson Recap
-
Lesson 05: Compliance
Compliance deals with a relatively structured approach to ensuring organizations meet their obligations to security standards through their security controls and practices.
- Concept 01: Lesson Overview
- Concept 02: Forces Driving Compliance
- Concept 03: Quiz: Forces Driving Compliance
- Concept 04: Compliance and Objectives
- Concept 05: Quiz: Compliance and Objectives
- Concept 06: Obligation Sources
- Concept 07: Quiz: Obligation Sources
- Concept 08: Exercise: Obligation Sources
- Concept 09: Compliance Obligation Evaluation
- Concept 10: Quiz: Compliance Obligation
- Concept 11: Exercise: Compliance Obligation Evaluation
- Concept 12: Control Assessments
- Concept 13: Quiz: Control Assessment
- Concept 14: Exercise: Control Assessment
- Concept 15: Lesson Recap
-
Lesson 06: Audit Management
The lesson focuses on ensuring that audits go smoothly by developing an understanding of audit management fundamentals and how GRC professionals should plan for and remediate audit results.
- Concept 01: Lesson Overview
- Concept 02: Why you must manage Audits
- Concept 03: Audit Management
- Concept 04: Audit Management Fundamentals
- Concept 05: Quiz: Audit Management Fundamentals
- Concept 06: Exercise: Audit Management Fundamentals
- Concept 07: Exercise Solution: Audit Management Fundamentals
- Concept 08: Follow Up and Remediation Plans
- Concept 09: Quiz: Follow-up and Remediation
- Concept 10: Exercise: Remediation Plans
- Concept 11: Exercise Solution: Follow-Up and Remediation Plan
- Concept 12: Lesson Recap
- Concept 13: Course Recap
- Concept 14: Congratulations!
-
Lesson 07: Project: SwiftTech Report
Apply the skills you have acquired to analyze data provided about a fictional technology company and create fundamental components of the company’s GRC program.
Project Description - Project: Create the SwiftTech GRC Program
-
Part 06 (Career): Career Services
The Careers team at Udacity is here to help you move forward in your career - whether it's finding a new job, exploring a new career path, or applying new skills to your current job.
-
Module 01: Career Services
-
Lesson 01: Take 30 Min to Improve your LinkedIn
Find your next job or connect with industry peers on LinkedIn. Ensure your profile attracts relevant leads that will grow your professional network.
- Concept 01: Get Opportunities with LinkedIn
- Concept 02: Use Your Story to Stand Out
- Concept 03: Why Use an Elevator Pitch
- Concept 04: Create Your Elevator Pitch
- Concept 05: Use Your Elevator Pitch on LinkedIn
- Concept 06: Create Your Profile With SEO In Mind
- Concept 07: Profile Essentials
- Concept 08: Work Experiences & Accomplishments
- Concept 09: Build and Strengthen Your Network
- Concept 10: Reaching Out on LinkedIn
- Concept 11: Boost Your Visibility
- Concept 12: Up Next
-