- Module 1: In recent years, the Zero Trust concept has emerged as a go-to security solution for organizations big or small. The Zero Trust approach is a combination of modern technologies and best practices that strengthens the security infrastructure within your organization.
By the end of this module, you'll be able to:
- Describe the Zero Trust security model and its principles.
- Explain Zero Trust as a security strategy.
- Define Zero Trust components.
- Module 2: With the advent of cloud applications and the increase in employees working remotely, or bringing their own devices, it's critical to verify identities with strong authentication and ensure access is compliant.
By the end of this module, you'll be able to:
- Describe identities in Zero Trust.
- Explain identity and access management.
- Module 3: Learn how to use Zero Trust to secure endpoints to protect your organization and its users.
By the end of this module, you'll be able to:
- Describe endpoints.
- Describe attack surface.
- Describe how to protect endpoints using the Zero Trust approach.
- Module 4: Learn how to use Zero Trust to secure your applications and to protect your organization and its users.
By the end of this module, you'll be able to:
- Describe applications.
- Describe shadow IT and its impact.
- Describe how to secure applications with a Zero Trust framework.
- Module 5: Networks enable us to communicate with everyone, from sharing pictures and video chats to online shopping and banking. Protecting your network from cybercriminals can be demanding as many of us move to hybrid working. A Zero Trust strategy will help to keep your networks safe and your data secure.
By the end of this module, you'll be able to:
- Describe a network and network encryption.
- Describe how network segmentation can limit the scope of a data breach.
- Describe threat protection and some of the tools you can use to protect your network.
- Module 6: Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.
By the end of this module, you'll be able to:
- Describe the threat vectors associated with your infrastructure.
- Describe how configuration management can improve your infrastructure.
- Describe how monitoring your infrastructure can identify possible vulnerabilities and attacks.
- Module 7: Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
By the end of this module, you'll be able to:
- Describe how to know your data.
- Describe how to protect data.
- Describe how to prevent data loss.
Overview
Syllabus
- Module 1: Module 1: Introduction to Zero Trust
- Introduction
- The Zero Trust security model
- Zero Trust as a security strategy
- Zero Trust components
- Knowledge check
- Summary
- Module 2: Module 2: Describe identities in Zero Trust
- Introduction
- Identities in Zero Trust
- Identity and access management
- Knowledge check
- Summary
- Module 3: Module 3: Secure endpoints with Zero Trust
- Introduction
- What are endpoints?
- Protect endpoints
- Knowledge check
- Summary
- Module 4: Module 4: Describe application access in Zero Trust
- Introduction
- Describe cloud applications
- Protect cloud applications using Zero Trust
- Knowledge check
- Summary
- Module 5: Module 5: Manage networks with Zero Trust
- Introduction
- What are networks?
- Common network attacks
- Zero Trust and the network
- Protecting your network with Zero Trust
- Knowledge check
- Summary
- Module 6: Module 6: Protect infrastructure with Zero Trust
- Introduction
- What is infrastructure?
- Assess and monitor your infrastructure with a Zero Trust framework
- Harden your infrastructure
- Knowledge check
- Summary
- Module 7: Module 7: Protect data with Zero Trust
- Introduction
- Know your data
- Protect your data and prevent data loss
- Knowledge check
- Summary