Course curriculum
-
-
Welcome to the Course!
-
Quick Course Overview
-
Why Learn Cyber Security from Me?
-
Download Course Lecture PDFs
-
Student Exercise: Introduce Yourself
-
-
-
Section Introduction
-
What is Zero Trust?
-
Some Zero Trust Definitions
-
Never Trust, Always Verify
-
Zero Trust Enterprise
-
Tenets of Zero Trust
-
Zero Trust Pillars
-
Zero Trust Historical Context
-
A Glimpse into ZTA
-
Section Quiz
-
-
-
Section Introduction
-
Why Do We Need Zero Trust?
-
Perimeter Security Pitfalls
-
Digital Transformation
-
Microsoft Case Study
-
The State of Zero Trust
-
Case Study: From SolarWinds to Zero Trust
-
Section Quiz
-
-
-
Section Introduction
-
The NIST Zero Trust Architectural (ZTA) Model
-
Example Real-Life ZTA Solutions
-
NIST ZTA Architecture Approaches
-
NIST ZTA Deployment Models
-
Introduction to Trust Algorithms & Policies
-
Section Quiz
-
-
-
Section Introduction
-
Reviewing the Pillars of Zero Trust
-
Securing the Users & Identity Pillar
-
Securing the Devices Pillar
-
Securing the Network & Environment PIllar
-
Securing the Applications & Workloads Pillar
-
Securing the Data Pillar
-
Foundational Components
-
Bringing It All Together
-
Case Study: Colonial Pipeline Cyber Attack
-
Section Quiz
-
-
-
Section Introduction
-
There is No Right Way to Zero Trust
-
Zero Trust Design Principles
-
The Five-Step Zero Trust Design Methodology
-
Forrester’s Five Steps to Zero Trust
-
Section Quiz
-
About this course
- $49.95
- 70 lessons
- 3.5 hours of video content