New Nanodegree Program; Zero Trust Security
We are proud to announce that today we launched the Zero Trust Security Course as the latest addition to our School of Cybersecurity. It is now available to students in the classroom!
Introduction to Zero Trust
Analyze the security approach of a recently breached company through the lens of ZT principles. By the end of this lesson, you’ll be able to distinguish between the perimeter network security model and the zero trust security model, identify areas that can be improved with ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in implementing a ZTA.
Zero Trust Security Concepts
Identify the philosophical principles behind the zero trust movement. Additionally, this lesson focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the pillars of the zero trust security model.
Zero Trust Methods
In this lesson you’ll learn about practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities that allow for the evaluation and refinement of safeguards. Plus, you’ll categorize identity-, device-, network-, application, and data-centric safeguards that enable zero trust architecture.
Organizational Practices
Assess a security system and the cultural readiness of an environment to adopt zero trust principles. Evaluate challenges to implementing ZTA principles and differentiate deployment strategies. Then map zero trust methods and analyze the inherent weaknesses of ZTA.
Course Project: Zero Trust Road Map
Perform an analysis of a sample company’s corporate profile and cybersecurity capabilities. Evaluate the company’s potential for implementing zero trust best practices and complete a road map toward a Zero Trust Architecture.
Please sign in to leave a comment.
Comments
0 comments