Understanding Zero Trust
Offered By: LinkedIn Learning
Course Description
Overview
Learn to operate with a zero trust approach to network security.
Syllabus
Introduction
- Using Zero Trust to protect against cyberattack
- What you should know
- A brief history of technology trust
- Concepts of software trust
- A case study in failed trust
- What is Zero Trust?
- The principles of Zero Trust
- ACT-IAC and the six pillars of zero trust
- Zero trust across the digital estate
- Policy-based admission control
- Zero Trust and the business context
- Zero Trust data
- An extended approach to Zero Trust
- Building a Zero Trust foundation
- Designing a policy engine
- Examples of zero trust
- What's next?
Taught by
Malcolm Shore
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity