Zero Trust Security
Offered By: Udacity
Course Description
Overview
This course introduces the zero trust security model, a dynamic approach to addressing the continual evolution of cybersecurity threats for organizations that demand flexibility and scalability in modern work environments. Traditional security models that rely on strong outer defenses are no longer viable strategies to protect a company’s valuable assets. Students who complete this course will be able to critically examine corporate security practices against the philosophy of “Never Trust, Always Verify”, and will be empowered to advocate for Zero Trust Architecture initiatives.
Syllabus
- Introduction to Zero Trust Security
- This lesson serves as an introduction to the course. By exploring zero trust core values and recent trends in cybersecurity, we demonstrate why this approach to security matters now more than ever.
- Zero Trust Security Concepts
- This lesson is a review of the core components required to implement a zero trust security system and how policy-based management systems allow us to "Never Trust, Always Verify".
- Zero Trust Methods
- This lesson focuses on the solutions and controls that can be implemented to introduce zero trust principles to any environment.
- Organizational Practices
- This lesson focuses on the selection and implementation of zero trust security controls through organizational practices.
- Zero Trust Road Map
- In this project, you will demonstrate your mastery of zero trust security concepts by recommending controls to revamp our company's security program!
Taught by
cd11535 Richard Phung
Related Courses
Palo Alto Networks Security Operations FundamentalsPalo Alto Networks via Coursera AZ-500: Manage Identity and Access
Microsoft via Microsoft Learn Microsoft 365 Fundamentals (MS-900) Cert Prep: 3 Security, Compliance, and Trust in Microsoft 365
LinkedIn Learning ゼロトラストセキュリティ
Udemy Achieving Zero Trust Security with Sophos Factory and HashiCorp
HashiCorp via YouTube