Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Zero Trust Security Fundamentals for IT Professionals
Introduction
Welcome to the Course! (0:43)
Quick Course Overview (5:19)
Why Learn Cyber Security from Me? (2:37)
Download Course Lecture PDFs
Student Exercise: Introduce Yourself
Zero Trust Fundamentals
Section Introduction (0:31)
What is Zero Trust? (5:03)
Some Zero Trust Definitions (5:02)
Never Trust, Always Verify (3:27)
Zero Trust Enterprise (1:41)
Tenets of Zero Trust (3:28)
Zero Trust Pillars (5:54)
Zero Trust Historical Context (3:38)
A Glimpse into ZTA (3:35)
Section Quiz
Why We Need Zero Trust
Section Introduction (0:41)
Why Do We Need Zero Trust? (4:04)
Perimeter Security Pitfalls (4:12)
Digital Transformation (4:13)
Microsoft Case Study (3:18)
The State of Zero Trust (8:22)
Case Study: From SolarWinds to Zero Trust
Student Exercise: SolarWinds Case Study Analysis
Section Quiz
Zero Trust Architecture (ZTA) Fundamentals
Section Introduction (0:27)
The NIST Zero Trust Architectural (ZTA) Model (12:42)
Example Real-Life ZTA Solutions (3:56)
NIST ZTA Architecture Approaches (2:51)
NIST ZTA Deployment Models (4:33)
Introduction to Trust Algorithms & Policies (9:07)
Section Quiz
Zero Trust Architectural Pillars
Section Introduction (0:36)
Reviewing the Pillars of Zero Trust (1:11)
Securing the Users & Identity Pillar (4:12)
Securing the Devices Pillar (3:13)
Securing the Network & Environment PIllar (3:22)
Securing the Applications & Workloads Pillar (2:56)
Securing the Data Pillar (3:09)
Foundational Components (6:35)
Bringing It All Together (1:23)
Case Study: Colonial Pipeline Cyber Attack
Student Exercise: Colonial Pipeline Case Study Analysis
Section Quiz
Designing a Zero Trust Architecture
Section Introduction (0:25)
There is No Right Way to Zero Trust (6:05)
Zero Trust Design Principles (5:35)
The Five-Step Zero Trust Design Methodology (5:57)
Forrester’s Five Steps to Zero Trust (5:12)
Section Quiz
Migrating to Zero Trust
Section Introduction (0:38)
Building a Business Case for Zero Trust (6:18)
The Challenge of Change (11:31)
Create a Zero Trust Team (5:14)
Leveraging the Zero Trust Implementation Curve (3:12)
Tips for a Successful Zero Trust Journey (3:06)
Section Quiz
Exploring ZTA Use Cases
Section Introduction (0:37)
VPN-Less Implementation (4:41)
East-West Segmentation (3:21)
Secure Access From Anywhere (3:18)
Conditional Authentication & Authorization (4:03)
Microsoft ZTA Step-by-Step (4:00)
Exploring Cloudflare’s Zero Trust Roadmap (2:56)
Section Quiz
Zero Trust Maturity Models
Section Introduction (0:32)
NSA Zero Trust Maturity Model (2:28)
Microsoft Zero Trust Maturity Model (5:18)
CISA Zero Trust Maturity Model (5:42)
DoD Target & Advanced Zero Trust Activities (2:51)
Section Quiz
Conclusion & Next Steps
Additional Recommended Resources (5:19)
Congratulations & Next Steps (0:34)
Securing the Users & Identity Pillar
Complete and Continue
Discussion
0
comments
Load more
0 comments