Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Offered By: Pluralsight
Course Description
Overview
This cyber security course will teach you to identify, develop, and implement several different use cases for zero trust architecture.
Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.
Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.
Taught by
Lyron Andrews
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network