Course PER-302-W

Web-based Training (Self-Paced)

Zero Trust Access and Identity Management

This course will address concepts related to Zero Trust and Access Control. Students will learn different forms of access control and their usages in practice, the concept of zero trust, the shift from perimeter-based security to Zero Trust, and Zero Trust implementation.

Objectives
  • having a better understanding of identity access control and its usages in practice.
  • having a better understanding of the tenets of Zero Trust.
  • understanding the shift from perimeter-based security to Zero Trust.
  • having a better understanding of Zero Trust implementation; authentication; asset inventory, information flow, and account management and auditing.
Target Audience

This developed for critical infrastructure managers, local government and private sector management, policymakers, emergency management, information security and cybersecurity personnel and managers. Individuals targeted include those whose official duties are part of the strategic planning process associated with successful agency/organizational operation, data integrity and data security.

Email

cfia@memphis.edu

Phone

(901) 678-4271

Like this course? Share with others!

Thousands trained at no cost

Be the next in line to get cybersecurity education for individuals, organizations, and jurisdictions without spending a dime.

Join the NCPC mailing list