The Zero Trust Security course covers the core principles and implementation strategies of the Zero Trust security model, emphasizing identity verification, least-privilege access, and continuous monitoring.

Course Objectives

  • Basics of Zero Trust
  • Zero Trust: Current State and Implementation challenges
  • Introduction to IT Security and Zero Trust
  • NIST Guidance on building Zero Trust Architecture
  • The 5 Basic Steps to Building a Zero Trust Network

Course Outline

Basics of Zero Trust

arrow iconarrow icon

  • Brief Threat Landscape History
  • Historical Overview of Cyber Threats
  • What is Zero Trust
  • Why Zero Trust
  • Issues Solved by Zero Trust