YoVDO

A Simplified and Practical Approach to Pursuing a Zero Trust Architecture

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Identity Management Courses

Course Description

Overview

Explore a simplified and practical approach to implementing a zero trust architecture in this 27-minute conference talk from RSA Conference. Learn design principles and overarching guidelines that don't require prohibitive resources and remain flexible and extensible. Discover how to focus on identity, policy, and people to create an effective zero trust framework. Gain insights from presenters Soumen Bhattacharya and Dr. Lynette Qu as they discuss topics including conditional access, reference materials, design principles, consolidation, enforcement, and real-world zero trust examples. Walk away with valuable takeaways to enhance your organization's security posture without major architectural revamps.

Syllabus

Introduction
Zero Trust Approach
Conditional Access
Reference Materials
Design Principles
Consolidation
Enforcement
Zero Trust Example
Takeaways


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube