This course is designed for developers, operators, security professionals, and architects working on medium to large microservice-based systems, as well as IT leaders and policy decision-makers looking to enhance security within their organization.
This course discusses the features and characteristics of a Zero Trust Architecture, the different models of trust and use cases, and provides opportunities for hands-on practice with open source tools such as SPIFFE/SPIRE, Open Policy Agent, and Istio service mesh.
You will be equipped with the tools and insights to navigate the increasingly significant landscape of Zero Trust Networks, which are the practical implementations of a Zero Trust Architecture, aimed at securing a network by adhering to Zero Trust practices. This knowledge will help prepare you to apply them in real-world scenarios, facilitating robust network security by adopting a 'Never Trust, Always Verify' approach.