YoVDO

Understanding Zero Trust

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Network Security Courses

Course Description

Overview

Learn to operate with a zero trust approach to network security.

Syllabus

Introduction
  • Using Zero Trust to protect against cyberattack
  • What you should know
1. Background
  • A brief history of technology trust
  • Concepts of software trust
  • A case study in failed trust
2. Zero Trust
  • What is Zero Trust?
  • The principles of Zero Trust
  • ACT-IAC and the six pillars of zero trust
  • Zero trust across the digital estate
  • Policy-based admission control
  • Zero Trust and the business context
  • Zero Trust data
  • An extended approach to Zero Trust
3. Implementing Zero Trust
  • Building a Zero Trust foundation
  • Designing a policy engine
  • Examples of zero trust
Conclusion
  • What's next?

Taught by

Malcolm Shore

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity