This course introduces the zero trust security model, a dynamic approach to addressing the continual evolution of cybersecurity threats for organizations that demand flexibility and scalability in modern work environments. Traditional security models that rely on strong outer defenses are no longer viable strategies to protect a company’s valuable assets. Students who complete this course will be able to critically examine corporate security practices against the philosophy of “Never Trust, Always Verify”, and will be empowered to advocate for Zero Trust Architecture initiatives.
Overview
Syllabus
- Introduction to Zero Trust Security
- This lesson serves as an introduction to the course. By exploring zero trust core values and recent trends in cybersecurity, we demonstrate why this approach to security matters now more than ever.
- Zero Trust Security Concepts
- This lesson is a review of the core components required to implement a zero trust security system and how policy-based management systems allow us to "Never Trust, Always Verify".
- Zero Trust Methods
- This lesson focuses on the solutions and controls that can be implemented to introduce zero trust principles to any environment.
- Organizational Practices
- This lesson focuses on the selection and implementation of zero trust security controls through organizational practices.
- Zero Trust Road Map
- In this project, you will demonstrate your mastery of zero trust security concepts by recommending controls to revamp our company's security program!
Taught by
cd11535 Richard Phung