A Simplified and Practical Approach to Pursuing a Zero Trust Architecture
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore a simplified and practical approach to implementing a zero trust architecture in this 27-minute conference talk from RSA Conference. Learn design principles and overarching guidelines that don't require prohibitive resources and remain flexible and extensible. Discover how to focus on identity, policy, and people to create an effective zero trust framework. Gain insights from presenters Soumen Bhattacharya and Dr. Lynette Qu as they discuss topics including conditional access, reference materials, design principles, consolidation, enforcement, and real-world zero trust examples. Walk away with valuable takeaways to enhance your organization's security posture without major architectural revamps.
Syllabus
Introduction
Zero Trust Approach
Conditional Access
Reference Materials
Design Principles
Consolidation
Enforcement
Zero Trust Example
Takeaways
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube