Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Zero Trust Networking (ZTN): The Big Picture

Course Cover
compare button icon

Course Features

icon

Duration

48 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

48 minutes

Course Description

Networks were initially designed for connectivity, i.e. to share a printer. A printer was as expensive as a house 30 years ago so it was important to share it. This course Zero Trust Networking: The Big Picture will teach you foundational knowledge, and help you to adapt your network to the digital world. You'll also learn how to combat bad actors, both internal and external, and improve your network. You will first learn the reasons why Zero Trust Networking is necessary. You will then learn about the components that are used to create a new network or security model, and how Zero Trust Networking works. You will also learn how to implement two Zero Trust projects, Microsegmentation and Software-defined perimeter. You will be able to use the skills and knowledge gained from this course in Zero Trust Networking to combat bad actors, both internal and external, within your network.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

You will learn foundational knowledge and gain the ability to evolve your network to match the new digital world and combat the bad actors both internal and external to your network

First, you will learn why we need Zero Trust Networking

Next, you will discover some of the components used to create a new network and security model and a good understanding of how Zero Trust Networking works

Finally, you will explore how to two Zero Trust projects of Microsegmention and Software-defined perimeter

When you’re finished with this course, you will have the skills and knowledge of Zero Trust Networking needed to match the new digital age and combat bad actors both internal and external to your network

Course Instructors

Author Image

Matt Conran

Instructor

Matt Conran has more than 24 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Network & Security Architect and successfully delivered maj...
Course Cover