Zero Trust Architecture Foundational Concepts
Offered By: Pluralsight
Course Description
Overview
Zero Trust Architecture addresses the limitations of traditional perimeter-based security. This course will teach you how to improve cyber resilience against evolving cyber threats.
Zero Trust Architecture revolutionizes cybersecurity by shifting from perimeter-focused defenses to a model where trust is never presumed. In this course, Zero Trust Architecture Foundational Concepts, you’ll learn to address the limitations of traditional perimeter-based security. First, you’ll explore the limitations of perimeter-based security. Next, you’ll discover the principles of Zero Trust (including the available resources). Finally, you’ll learn how to implement Zero Trust. When you’re finished with this course, you’ll have the skills and knowledge of design and implement modern architectures needed to uplift security defenses to withstand modern threats..
Zero Trust Architecture revolutionizes cybersecurity by shifting from perimeter-focused defenses to a model where trust is never presumed. In this course, Zero Trust Architecture Foundational Concepts, you’ll learn to address the limitations of traditional perimeter-based security. First, you’ll explore the limitations of perimeter-based security. Next, you’ll discover the principles of Zero Trust (including the available resources). Finally, you’ll learn how to implement Zero Trust. When you’re finished with this course, you’ll have the skills and knowledge of design and implement modern architectures needed to uplift security defenses to withstand modern threats..
Syllabus
- Course Overview 1min
- Exploring the Need for Zero Trust 16mins
- Defining Zero Trust Architecture 23mins
- Implementing Zero Trust 25mins
Taught by
Cristian Pascariu
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity