Zero Trust Training Exam Bundle

Zero Trust Training Exam Bundle

The ZTT exam bundle contains an exam token and everything necessary to train for and take the ZTT exam. This package provides the most value by providing a discount when the training and exam are purchased together.

rate limit

Code not recognized.

Click here for more details about this course.

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 16 hours to complete. After completion, you will receive a certificate for 16 course hour(s) that may be submitted for possible CPE credits.

This course is intended to provide learners with an in-depth look at the key features and technologies of SDP for securing today’s and tomorrow’s IT

Building on the foundational principle of Zero Trust that no part of a computing and networking system can be implicitly trusted, including the humans operating it, this course will give you the knowledge and skills necessary to implement a Zero Trust strategy and reduce systemic risk. Covering seven areas of Zero Trust knowledge, the Zero Trust Training (ZTT) outlines how to put specific measures in place to provide assurance that systems and their components operate appropriately and are continuously verified. ZTT enables you to understand and implement Zero Trust principles into business planning, enterprise architectures, and technology deployments.

The Zero Trust Training consists of the following courses:

  • Introduction to Zero Trust Architecture 
  • Introduction to Software-Defined Perimeter
  • Key Features & Technologies of Software-Defined Perimeter 
  • Architecture & Components of Software-Defined Perimeter
  • ZT Planning (Coming Soon)
  • ZT Implementation (Coming Soon)
  • ZTT Exam (Coming Soon)

Please note currently, only the first four courses in the series are available for consumption and the ZT Exam is not live yet. As part of this bundle, the other courses in the series and the ZTT exam will be made available to you once public. 

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers