Introduction to Zero Trust Architecture

Introduction to Zero Trust Architecture

Foundations, definitions, concepts, and components of Zero Trust. In this module, learners will be introduced to goals, benefits, planning considerations, implementation options, and use cases for Zero Trust.

rate limit

Code not recognized.

About this course

This course provides an introduction to Zero Trust and Zero Trust Architecture. It covers foundational topics such as Zero Trust’s relevance, definitions, components, requirements, tenets, pillars, goals, objectives, and benefits. Learners will be introduced to planning considerations and implementation options for Zero Trust Architecture. Additionally, use cases are used to demonstrate how different topologies can work together to enhance security in environments assumed to be hostile. Diagrams, explanations, and references are provided to facilitate the learning process.

 

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

After completing this course you will receive a certificate for 2 course hours that can be submitted for possible CPE credits.

CurriculumTake Course

  • Introduction to Zero Trust Architecture Study Guide
  • Introduction to Zero Trust Architecture
  • Definitions, Concepts, & Components of ZT
  • Objectives of Zero Trust
  • Benefits of Zero Trust
  • Planning Considerations ZTA
  • ZTA Implementation Examples
  • Zero Trust Use Cases

About this course

This course provides an introduction to Zero Trust and Zero Trust Architecture. It covers foundational topics such as Zero Trust’s relevance, definitions, components, requirements, tenets, pillars, goals, objectives, and benefits. Learners will be introduced to planning considerations and implementation options for Zero Trust Architecture. Additionally, use cases are used to demonstrate how different topologies can work together to enhance security in environments assumed to be hostile. Diagrams, explanations, and references are provided to facilitate the learning process.

 

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

After completing this course you will receive a certificate for 2 course hours that can be submitted for possible CPE credits.

CurriculumTake Course

  • Introduction to Zero Trust Architecture Study Guide
  • Introduction to Zero Trust Architecture
  • Definitions, Concepts, & Components of ZT
  • Objectives of Zero Trust
  • Benefits of Zero Trust
  • Planning Considerations ZTA
  • ZTA Implementation Examples
  • Zero Trust Use Cases