Key Features & Technologies of Software-Defined Perimeter Study Guide
Traditional Architectural Challenges
The Principles of Least Privilege & Need to Know
Hiding of Infrastructure
Identity & Access Management (IAM)
Secure Remote Access
Key Features & Technologies of Software-Defined Perimeter
Software-Defined Perimeters enable security professionals to protect their organizations from sophisticated cyber threats. In this course, learners will get an in-depth look at the key features and technologies of SDP.
Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase.
This course is intended to provide learners with an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models. Learners will be guided through the various interactions and mechanisms that form the basis of an organization’s SDP-based Zero Trust Architecture.
After completing this course, learners will be able to:
- Understand the main components that make up an SDP architecture
- Describe the onboarding and access workflows established for supporting SDP processes
- Describe the communication flows that occur between SDP components
- Explain the SDP logging mechanisms and the role they play in SDP architectures
- Understand CSA’s SDP and NIST’s ZTA deployment models
This course is a great fit for users in any of the following roles:
- C-Suite (CEO, CTO, CISO, CIO)
- Managers and Decision Makers
- Cybersecurity Analysts
- Security Engineers and Architects
- Enterprise Architects
- Security Administrators
- Compliance Managers
- Systems Engineers
After completing this course you will receive a certificate for 1 course hour that can be submitted for possible CPE credits.