Learn to operate with a zero trust approach to network security.
Overview
Syllabus
Introduction
- Using Zero Trust to protect against cyberattack
- What you should know
- A brief history of technology trust
- Concepts of software trust
- A case study in failed trust
- What is Zero Trust?
- The principles of Zero Trust
- ACT-IAC and the six pillars of zero trust
- Zero trust across the digital estate
- Policy-based admission control
- Zero Trust and the business context
- Zero Trust data
- An extended approach to Zero Trust
- Building a Zero Trust foundation
- Designing a policy engine
- Examples of zero trust
- What's next?
Taught by
Malcolm Shore