Description
In this course, you will learn:
- Create a roadmap that incorporates Zero Trust as the focus of your security initiatives and gains support from key stakeholders by aligning with existing business or organizational initiatives.To secure and protect your organization's data, take a three-pronged approach (define, dissect, and defend) and use threat intelligence to implement appropriate controls.
- Learn about insider threats and best practices for identity and access management (IAM) so you can optimize and automate your security response.
- Use security analytics to close current security gaps surrounding devices (managed, unmanaged, and IoT) and suggest policies for better device management.
- Create an application security strategy and consider the benefits of collaborating with your development team to better "secure what you sell."
- Create a strategy for securing your Zero Trust network, ensuring effective network microsegmentation, and cultivating a mature security culture.
Syllabus:
- Get Started On Your Zero Trust Journey
- Protect Your Data And Assets
- Manage Users And Identities
- Secure Your Devices
- Enable Workload Security
- Architect Your Network Security