The intent of this course is to increase the learners’ understanding of Zero Trust methodology, principles, and implementation. The goal of this course is to prepare organizations to face existing threats and adapt to new threats in the future.
This course addresses concepts related to Zero Trust and Identity and Access Management. Some of the topics covered include:
- the shift from perimeter-based security to Zero Trust;
- the core principles of a Zero Trust reference architecture;
- the basic tenets of a Zero Trust reference architecture;
- the foundations, key principles, logical components, the key benefits of a Zero Trust reference architecture; and
- Zero Trust implementation.
Students will learn different forms of access control and their usages in practice, as well as the overall concept of zero trust.
There are no prerequisites for this course.