Zero trust is a security model that has been growing in popularity over recent years. Based on the concept of “never trust, always verify,” the approach dictates that no users or devices should be inherently trusted, even if part of a local network or a connected device.

ISC2 research found that zero trust ranked high as a current skills gap within teams, but also has a strong potential for positive impact.

  • Of the 92% who reported having skills gaps in their organization, zero trust ranked third (behind cloud computing security and AI/ML) at 29%.
  • Zero trust network access also ranked second – at 34% – by respondents when asked which emerging cybersecurity technologies/architectures they believe will have the greatest positive impact on their ability to secure their organizations.

If you've seen zero trust as a hot topic at cybersecurity conferences and webinars, but aren’t sure how to implement this approach, ISC2 has resources to start you off on the right path.

Protecting Data Using Zero Trust Courses

ISC2 Courses - Protecting Data Using Zero TrustThe first course is Defining the Boundaries of Zero Trust. This foundational course will earn you two CPE credits and is focused on security operations. This course invites you to review guiding principles for workflow, system design and operations that create a zero trust architecture. ISC2 members can take the course for $38, while non-members can access it for $46.

The other courses – Vulnerability Management in Zero Trust and Continuous Monitoring and Incident Response for Zero Trust – are also foundational and worth one CPE credit each. These courses are $19 for ISC2 members, or $23 for non-members.

  • Vulnerability Management in Zero Trust is focused on the crucial component vulnerability management plays in cybersecurity operations, specifically in zero trust architecture (ZTA). Throughout your learning experience, you will review the identification, assessment, prioritization and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.
  • Continuing Monitoring and Incident Response for Zero Trust reviews the necessity of real-time collection, analysis and assessment of data from various sources to identify potential security incidents, anomalies and threats. You’ll learn about the integration of security information and event management (SIEM) systems, automated threat intelligence feeds and orchestrated incident response workflows.

If you’re looking to take all three courses to build your foundational knowledge of zero trust, ISC2 is offering a discount of 20% off for the three-course bundle. This discount applies to both the member and non-member pricing.

Continuing Professional Development from ISC2

Finding cybersecurity education to support the industry’s in-demand skills has never been easier. Our education experts at ISC2 recently redesigned the way you discover training on our site by grouping Skill-Builders, Certificates and Events by categories, including Security Operations (where you’ll find the zero trust options), Software Security, Cloud Security and more. All ISC2-produced CPE content is automatically submitted on your behalf to the CPE portal, making it even easier for you to keep your credentials up to date.