Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture
Offered By: Pluralsight
Course Description
Overview
In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.
One of today's biggest problems is that network infrastructure and applications are wide open to severe security threats. In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats. First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter. When you're finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today.
One of today's biggest problems is that network infrastructure and applications are wide open to severe security threats. In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats. First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter. When you're finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today.
Syllabus
- Course Overview 1min
- Validating Connectivity within Zero Trust SDP 26mins
- Functions of SDP: What Can SDP Be Used For? 29mins
- Creating an SDP Network: The Components Involved 35mins
Taught by
Matt Conran
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network