Completed
Symbolic Policy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Zero Trust Networks - In Theory and in Practice
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Meet Doug and Evan
- 3 Problem Statement
- 4 Example Policy
- 5 VPN Architecture
- 6 Scalability Concerns
- 7 Raw IP
- 8 Network properties
- 9 Google Beyond Core
- 10 Zero Trust
- 11 Every Flow is Expected
- 12 Symbolic Policy
- 13 Network Agent
- 14 Automation
- 15 Visibility
- 16 Whitelisting
- 17 Key Systems
- 18 Inventory Systems
- 19 Configuration Management Systems
- 20 Authentication Services
- 21 Zero Trust Network Implementations
- 22 Data Plane
- 23 Server vs Client
- 24 Provisioning Service
- 25 Removing Trust
- 26 Agility
- 27 Client side
- 28 Large corporate network
- 29 Beyond Corp
- 30 Control Plan
- 31 SSO
- 32 Access Control Engine
- 33 Zero Trust Corporate Network
- 34 Trust Inference Engine
- 35 Behavioral Harristix
- 36 User Experience
- 37 Reality
- 38 Building Blocks
- 39 Clientside implementations
- 40 Serverside implementations
- 41 Commercial options
- 42 Conclusion
- 43 Endpoint Management
- 44 BlueScient