In this course, you will :
- Examine a recently breached company's security strategy through the lens of ZT principles.
- be able to differentiate between the perimeter network security model and the zero trust security model, identify areas that can be improved using ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in ZTA implementation
- Determine the philosophical principles underlying the zero-trust movement. Moreover, focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the zero trust security model's pillars.
- Learn about practical deployment resources, Zero Trust Network Architecture (ZTNA) requirements, and foundational capabilities that allow for safeguard evaluation and refinement.
- Identity-, device-, network-, application-, and data-centric safeguards that enable zero trust architecture will be classified.
- Evaluate a security system and an environment's cultural readiness to adopt zero trust principles.
- Assess implementation challenges and differentiate deployment strategies. Then, map zero trust methods and examine ZTA's inherent flaws.
- Introduction to Zero Trust
- Zero Trust Security Concepts
- Zero Trust Methods
- Organizational Practices
- Course Project: Zero Trust Road Map