Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

The Zero Trust Security Framework

Course Cover
compare button icon
Course Report - The Zero Trust Security Framework

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

1 day

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Instructor Paced

icon

Video Content

0.3 hour

Course Description

Zero Trust is a popular reference for security best practice. Unfortunately, vendor marketing and other misleading data have caused confusion about Zero Trust and how it should be used. A false sense of security can result from a misinterpretation of Zero Trust.

This course will cover the history and origins of popular terms used for security best practices. It will also discuss how Zero Trust was created. We'll be looking at all Zero Trust frameworks, from the oldest to the most recent Zero Trust versions. Also, we will discuss how vendor agnostic capabilities can be used in security practices to achieve Zero Trust best practice. The topics covered include cloud, network and endpoint security concepts. There will be misconceptions discussed, such as the fact that Zero Trust is not possible by just purchasing a Firewall, Identity Management Solution, or Network Access Control offering. You can expect many real-world examples, demos, and definitions of topics you can relate to.

Joseph Muniz has been working in the security industry since 1995, providing consulting services for a variety of clients -- from Fortune 500 to Federal. He is an accomplished speaker at industry conferences and has published numerous books including Security Operations Center (SOC), and Investigating Cyber Breach (both from Cisco Press).

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Determine how to apply security best practices represented in the latest Zero Trust framework to your organization.

Understand how to assess your existing security capabilities and map out a plan for improving your organization’s security practice.

Understand security best practices for all areas of your business (cloud, endpoint and network)

Understand the true meaning of the Zero Trust security framework

Course Cover