Key Features & Technologies of Software-Defined Perimeter

Key Features & Technologies of Software-Defined Perimeter

Software-Defined Perimeters enable security professionals to protect their organizations from sophisticated cyber threats. In this course, learners will get an in-depth look at the key features and technologies of SDP.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This course is intended to provide learners with an in-depth look at the key features and technologies of SDP for securing today’s and tomorrow’s IT infrastructures—whether they are on-premises, in the cloud, a hybrid of the two, or a case with multiple cloud service providers. Additionally, learners will be introduced to the principles of Least Privilege and Need to Know, policy-based authorization and access controls, and the similarities and differences between SDP and SDN.

After completing this course, learners will be able to:

  • Understand the limitations of traditional security architecture when integrating security controls, securing shifting perimeters, and dealing with the IP address challenge
  • Explain SDP’s key features, including separate data and control planes, default drop-all firewalls, and single packet authorization
  • Discuss how policy-based authorization and granular access controls help enforce the principle of least privilege and need to know
  • Distinguish between SDP’s secure remote access and virtual private network
  • Describe mutual authentication, tunneling, micro-segmentation, and identity and access management in the context of SDP 
  • Compare and contrast software-defined networks and SDP

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our FAQ.

Curriculum

  • Key Features & Technologies of Software-Defined Perimeter Study Guide
  • Traditional Architectural Challenges
  • The Principles of Least Privilege & Need to Know
  • Hiding of Infrastructure
  • Mutual Authentication
  • Tunneling
  • Micro-Segmentation
  • Identity & Access Management (IAM)
  • Secure Remote Access
  • Software-Defined Networking
  • Course Survey

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This course is intended to provide learners with an in-depth look at the key features and technologies of SDP for securing today’s and tomorrow’s IT infrastructures—whether they are on-premises, in the cloud, a hybrid of the two, or a case with multiple cloud service providers. Additionally, learners will be introduced to the principles of Least Privilege and Need to Know, policy-based authorization and access controls, and the similarities and differences between SDP and SDN.

After completing this course, learners will be able to:

  • Understand the limitations of traditional security architecture when integrating security controls, securing shifting perimeters, and dealing with the IP address challenge
  • Explain SDP’s key features, including separate data and control planes, default drop-all firewalls, and single packet authorization
  • Discuss how policy-based authorization and granular access controls help enforce the principle of least privilege and need to know
  • Distinguish between SDP’s secure remote access and virtual private network
  • Describe mutual authentication, tunneling, micro-segmentation, and identity and access management in the context of SDP 
  • Compare and contrast software-defined networks and SDP

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our FAQ.

Curriculum

  • Key Features & Technologies of Software-Defined Perimeter Study Guide
  • Traditional Architectural Challenges
  • The Principles of Least Privilege & Need to Know
  • Hiding of Infrastructure
  • Mutual Authentication
  • Tunneling
  • Micro-Segmentation
  • Identity & Access Management (IAM)
  • Secure Remote Access
  • Software-Defined Networking
  • Course Survey