Completed
Information Security 101
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Establishing a Production Zero Trust Architecture
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Reality/Assumption Gap
- 3 Drivers
- 4 Change comes with Risk
- 5 Triangle of Trust
- 6 Perimeter Defense - Zero Trust
- 7 Zero Trust Environment
- 8 User Identity
- 9 Attest Workloads
- 10 Establish Policy
- 11 Establish Trust between Organizations
- 12 Application needs a connection to the Secure Corporate Intranet!
- 13 Advanced Use Case: Multi-Party Edge Compute
- 14 Identities for Infrastructure too
- 15 No Workload Authentication
- 16 Multi-factor Authorization (SPIFFE+JWT)
- 17 Workload 2FA: Identity Provider + Application Identity
- 18 Let's back up and talk strategy
- 19 Information Security 101
- 20 One possible early strategy
- 21 Observability
- 22 Education
- 23 An Aside: Legacy Systems
- 24 Automate
- 25 Educate