Preparing for a Zero Trust Initiative
A Zero Trust security model when implemented by an organization reduces external and internal threats to systems and data. Preparing for a Zero Trust initiative is paradigm shifting for organizations that are migrating to the cloud and/or transforming legacy network-based controls for Authentication (AuthN) and Authorization (AuthZ). This course prepares you to be successful by presenting foundational principles, threat scenarios, reference architectures and a policy governance framework that can be applied to reduce risk.
- Foundations in Zero Trust Architecture
- Creating a Zero Trust Strategy
- Implementing Zero Trust Architectures
Who Should Take This Course:
Anyone with a computer science or cybersecurity background interested in learning to implement zero trust. Learners must have a foundational understanding of basic security concepts including authorization, authentication, and a working understanding of networks and firewalls. A basic understanding of zero trust is recommended.
About This Course:
Express Learning courses are created by industry experts and are designed to quickly address a hot industry topic or trend in cybersecurity. You will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning. At the end of the course, you will be asked to take a final assessment and must score 70% or higher prior to receiving a certificate of completion and earning continuing professional education (CPE) credits.