Course curriculum

    1. Welcome to the Course!

    2. Quick Course Overview

    3. Why Learn Cyber Security from Me?

    4. Download Course Lecture PDFs

    5. Student Exercise: Introduce Yourself

    1. Section Introduction

    2. What is Zero Trust?

    3. Some Zero Trust Definitions

    4. Never Trust, Always Verify

    5. Zero Trust Enterprise

    6. Tenets of Zero Trust

    7. Zero Trust Pillars

    8. Zero Trust Historical Context

    9. A Glimpse into ZTA

    10. Section Quiz

    1. Section Introduction

    2. Why Do We Need Zero Trust?

    3. Perimeter Security Pitfalls

    4. Digital Transformation

    5. Microsoft Case Study

    6. The State of Zero Trust

    7. Case Study: From SolarWinds to Zero Trust

    8. Section Quiz

    1. Section Introduction

    2. The NIST Zero Trust Architectural (ZTA) Model

    3. Example Real-Life ZTA Solutions

    4. NIST ZTA Architecture Approaches

    5. NIST ZTA Deployment Models

    6. Introduction to Trust Algorithms & Policies

    7. Section Quiz

    1. Section Introduction

    2. Reviewing the Pillars of Zero Trust

    3. Securing the Users & Identity Pillar

    4. Securing the Devices Pillar

    5. Securing the Network & Environment PIllar

    6. Securing the Applications & Workloads Pillar

    7. Securing the Data Pillar

    8. Foundational Components

    9. Bringing It All Together

    10. Case Study: Colonial Pipeline Cyber Attack

    11. Section Quiz

    1. Section Introduction

    2. There is No Right Way to Zero Trust

    3. Zero Trust Design Principles

    4. The Five-Step Zero Trust Design Methodology

    5. Forrester’s Five Steps to Zero Trust

    6. Section Quiz

About this course

  • $49.95
  • 70 lessons
  • 3.5 hours of video content

Discover your potential, starting today