Key Features & Technologies of Software-Defined Perimeter

Key Features & Technologies of Software-Defined Perimeter

Software-Defined Perimeters enable security professionals to protect their organizations from sophisticated cyber threats. In this course, learners will get an in-depth look at the key features and technologies of SDP.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible CPE credits.


This course is intended to provide learners with an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models. Learners will be guided through the various interactions and mechanisms that form the basis of an organization’s SDP-based Zero Trust Architecture.

After completing this course, learners will be able to:

  • Understand the main components that make up an SDP architecture
  • Describe the onboarding and access workflows established for supporting SDP processes 
  • Describe the communication flows that occur between SDP components     
  • Explain the SDP logging mechanisms and the role they play in SDP architectures 
  • Understand CSA’s SDP and NIST’s ZTA deployment models

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

For more information regarding the calculation of course length and CPE credits, please refer to our FAQ.

Curriculum

  • Key Features & Technologies of Software-Defined Perimeter Study Guide
  • Traditional Architectural Challenges
  • The Principles of Least Privilege & Need to Know
  • Hiding of Infrastructure
  • Mutual Authentication
  • Tunneling
  • Micro-Segmentation
  • Identity & Access Management (IAM)
  • Secure Remote Access
  • Software-Defined Networking
  • Course Survey

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible CPE credits.


This course is intended to provide learners with an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models. Learners will be guided through the various interactions and mechanisms that form the basis of an organization’s SDP-based Zero Trust Architecture.

After completing this course, learners will be able to:

  • Understand the main components that make up an SDP architecture
  • Describe the onboarding and access workflows established for supporting SDP processes 
  • Describe the communication flows that occur between SDP components     
  • Explain the SDP logging mechanisms and the role they play in SDP architectures 
  • Understand CSA’s SDP and NIST’s ZTA deployment models

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

For more information regarding the calculation of course length and CPE credits, please refer to our FAQ.

Curriculum

  • Key Features & Technologies of Software-Defined Perimeter Study Guide
  • Traditional Architectural Challenges
  • The Principles of Least Privilege & Need to Know
  • Hiding of Infrastructure
  • Mutual Authentication
  • Tunneling
  • Micro-Segmentation
  • Identity & Access Management (IAM)
  • Secure Remote Access
  • Software-Defined Networking
  • Course Survey