Zero Trust Networks - In Theory and in Practice

Zero Trust Networks - In Theory and in Practice

BSidesLV via YouTube Direct link

Example Policy

4 of 44

4 of 44

Example Policy

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Zero Trust Networks - In Theory and in Practice

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Meet Doug and Evan
  3. 3 Problem Statement
  4. 4 Example Policy
  5. 5 VPN Architecture
  6. 6 Scalability Concerns
  7. 7 Raw IP
  8. 8 Network properties
  9. 9 Google Beyond Core
  10. 10 Zero Trust
  11. 11 Every Flow is Expected
  12. 12 Symbolic Policy
  13. 13 Network Agent
  14. 14 Automation
  15. 15 Visibility
  16. 16 Whitelisting
  17. 17 Key Systems
  18. 18 Inventory Systems
  19. 19 Configuration Management Systems
  20. 20 Authentication Services
  21. 21 Zero Trust Network Implementations
  22. 22 Data Plane
  23. 23 Server vs Client
  24. 24 Provisioning Service
  25. 25 Removing Trust
  26. 26 Agility
  27. 27 Client side
  28. 28 Large corporate network
  29. 29 Beyond Corp
  30. 30 Control Plan
  31. 31 SSO
  32. 32 Access Control Engine
  33. 33 Zero Trust Corporate Network
  34. 34 Trust Inference Engine
  35. 35 Behavioral Harristix
  36. 36 User Experience
  37. 37 Reality
  38. 38 Building Blocks
  39. 39 Clientside implementations
  40. 40 Serverside implementations
  41. 41 Commercial options
  42. 42 Conclusion
  43. 43 Endpoint Management
  44. 44 BlueScient

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.