Protecting Data Using Zero Trust Courses
Demonstrate your understanding of the principles and requirements necessary to transition from traditional perimeter-based security to a security operating model focused on granular trust relationships with our ISC2 Protecting Data Using Zero Trust Courses.
Whether you’re looking to stay ahead of the curve through professional development or exploring a pathway to ISC2 Systems Security Certified Practitioner (SSCP) certification, our ISC2 Protecting Data Using Zero Trust Courses give you the flexibility to suit your needs.
Defining the Boundaries of Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Review the principles and requirements necessary to transition from the traditional approach of perimeter-based security to a security operating model focused on granular trust relationships that are business-enabling and data-centric. Throughout your learning, you will identify the importance of continual and vigilant analysis of the entire ecosystem; the requirements of specific models, business needs and use cases; and the necessary components to implement in the context of zero trust.
Non-Member U.S. $46.00 Member U.S. $38.00
Vulnerability Management in Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Explore vulnerability management as a crucial component in cybersecurity operations, specifically in zero trust architecture (ZTA). You’ll learn essential principles and best practices, such as asset discovery, risk-based trust assessment and integration with zero trust policy enforcement mechanisms. This course also reviews the identification, assessment, prioritization and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.
Non-Member U.S. $23.00 Member U.S. $19.00
Continuous Monitoring and Incident Response for Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Understand the necessity for real-time collection, analysis and assessment of data from various sources to identify potential security incidents, anomalies and threats. Learn key aspects of implementing continuous monitoring and incident response within a zero trust framework, including the integration of security information and event management (SIEM) systems, automated threat intelligence feeds and orchestrated incident response workflows.
Non-Member U.S. $23.00 Member U.S. $19.00
Use your ISC2 Protecting Data Using Zero Trust Courses to:
- Act as a pathway to ISC2 SSCP certification
- Demonstrate commitment to maintaining your ISC2 certification through professional development
- Stay ahead of the curve by gaining expertise in emerging cybersecurity topics
- Earn CPE credits
Who Should Take the Courses?
Cybersecurity professionals who want to develop their operational knowledge of the zero trust principles and models that can be implemented to improve the security posture of an organization protecting any classification or sensitivity level of data.
Bundle and Save 20%
Purchase all three Protecting Data Using Zero Trust Courses and save 20% now!
Bundle + Save