YoVDO

Zero Trust Architecture (ZTA): Strategize and Establish

Offered By: Pluralsight

Tags

Cybersecurity Courses Network Security Courses Network Architecture Courses

Course Description

Overview

This course will teach you the steps involved in establishing a zero trust architecture.

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

Syllabus

  • Course Overview 1min
  • Preparing for the Five-step Path to Zero Trust 17mins
  • Establishing the Protect Surface, Transaction Flows, and Architecture 14mins
  • Building a Zero Trust Policy and a Monitoring Schema 13mins

Taught by

Lyron Andrews

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity