A Simplified and Practical Approach to Pursuing a Zero Trust Architecture
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore a simplified and practical approach to implementing a zero trust architecture in this 27-minute conference talk from RSA Conference. Learn design principles and overarching guidelines that don't require prohibitive resources and remain flexible and extensible. Discover how to focus on identity, policy, and people to create an effective zero trust framework. Gain insights from presenters Soumen Bhattacharya and Dr. Lynette Qu as they discuss topics including conditional access, reference materials, design principles, consolidation, enforcement, and real-world zero trust examples. Walk away with valuable takeaways to enhance your organization's security posture without major architectural revamps.
Syllabus
Introduction
Zero Trust Approach
Conditional Access
Reference Materials
Design Principles
Consolidation
Enforcement
Zero Trust Example
Takeaways
Taught by
RSA Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network