YoVDO

Zero Trust Architecture (ZTA): Strategize and Establish

Offered By: Pluralsight

Tags

Cybersecurity Courses Network Security Courses Network Architecture Courses

Course Description

Overview

This course will teach you the steps involved in establishing a zero trust architecture.

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

Syllabus

  • Course Overview 1min
  • Preparing for the Five-step Path to Zero Trust 17mins
  • Establishing the Protect Surface, Transaction Flows, and Architecture 14mins
  • Building a Zero Trust Policy and a Monitoring Schema 13mins

Taught by

Lyron Andrews

Related Courses

5G for Everyone
Qualcomm via Coursera
Advanced Cyber Security Training
EC-Council via FutureLearn
Working with tcpdump Filters
Coursera Project Network via Coursera
Cloud Computing Fundamentals on Alibaba Cloud
Alibaba Cloud Academy via Coursera
Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera