- Duration: Flexible
Course details
Zero Trust is a security model that assumes that all network traffic is untrusted and requires verification before access is granted. This online training course is designed to provide a comprehensive understanding of Zero Trust networks and how to implement them.
Throughout the course, you will learn the key concepts and best practices of Zero Trust, including the principle of "never trust, always verify" and the use of multi-factor authentication. You will learn how to use Zero Trust to create a secure network environment that is resistant to cyber threats.
The course will cover the technical, management, and organizational aspects of Zero Trust, and you will learn how to use Zero Trust to comply with regulations and industry standards. Additionally, you will learn about the latest threats and vulnerabilities and how to use Zero Trust to protect against them.
The course includes hands-on exercises that demonstrate the implementation of Zero Trust in real-world situations. You will learn how to implement Zero Trust in different network environments, including on-premises, cloud, and hybrid networks.
You will also learn about the different components of a Zero Trust network, including micro-segmentation, network access control, and identity and access management. Additionally, you will learn about the different tools and technologies that are used to implement Zero Trust, such as firewalls, VPNs, and identity and access management systems.
Another focus of the course is on the Zero Trust architecture, where you will learn about the different architectural models and best practices for designing and implementing Zero Trust networks. Additionally, you will learn about the different protocols and standards that are used in Zero Trust networks, such as SSL/TLS, SAML, and OAuth.
The course will also cover the management and monitoring of Zero Trust networks, where you will learn about the different monitoring and management tools and best practices for maintaining a Zero Trust network. Additionally, you will learn about the different compliance and regulatory requirements that are associated with Zero Trust networks and how to meet these requirements.
This course is designed for IT professionals, security professionals, and network administrators who are responsible for implementing and maintaining secure network environments. By the end of the course, you will have a deep understanding of Zero Trust networks and how to implement them, and you will be able to create a secure network environment that is resistant to cyber threats and compliant with regulations and industry standards.
In this course you will learn following concepts and each Concept has further topics
1) Some Basics about Zero Trust
History of Zero Trust
What is Zero Trust
Why Zero Trust
Issues Solved by Zero Trust
2) Zero Trust : Current State and Implementation challenges
Evolution of Zero Trust
Present State of Zero Trust
Challenges in Zero trust Implementation
3) NIST Guidance on building Zero Trust Architecture
What Is Zero-Trust Architecture (ZTA)?
NISTs 6 Key Tenets of Zero Trust Architecture
Part 1: Overview of NIST Zero Trust Architecture
Part 2: Logical Components NIST Zero Trust Architecture
Part 3: Logical Components NIST Zero Trust Architecture
4) The 5 Basic Steps to Building a Zero Trust Network
Step 1 : Define Attack Surface
Step 2 Implement Controls Around Network Traffic
Step 3: Plan your Zero Trust Network
Step 4 : Design Your Zero Trust Policy
Step 5: Monitor and maintain networks
Bonus : Guides on Zero Trust
5) Demo :Implement Zero Using Conditional Access Policies
Six foundational pillar
Overview of Azure Conditional Access Policies
Implement Conditional access using MFA
6) Zero Trust Architecture - Use Cases
Maintain Compliance
Securing Cloud Migrations
DevOps and Continuous Delivery
In summary, achieving Zero-Trust does not require adoption of any new technologies. Its simply a new approach to cybersecurity to never trust, always verify, or to eliminate any and all trust, as opposed to the more common perimeter-based security approach that assumes user identities have not been compromised, all human actors are responsible and can be trusted. The concept of trusting anything internal to our networks is fundamentally flawed as evidenced by all the data breaches in the news, with most of the breaches caused by misuse of privileged credentials.
Updated on 02 May, 2023- IT Administration, Networking, Cyber Security Awareness NextGen LearningUSD 122Duration: Upto 1 Hour
- USD 49Duration: 1 To 2 Months