Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Companies around the world are facing constant and evolving cyber attacks, so it’s imperative that they find talent with the dynamic skills to address these pressing issues.
05Days07Hrs48Min07Sec
At 5-10 hours/week
Get access to classroom immediately on enrollment
Learners leave the course with a reinvigorated perspective on cybersecurity and a lexicon of practices and solutions that support what is rapidly becoming the new dominant strategy in enterprise security.
Familiarity with basic cybersecurity concepts and practices.
Analyze the security approach of a recently breached company through the lens of ZT principles. By the end of this lesson, you’ll be able to distinguish between the perimeter network security model and the zero trust security model, identify areas that can be improved with ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in implementing a ZTA.
Identify the philosophical principles behind the zero trust movement. Additionally, this lesson focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the pillars of the zero trust security model.
In this lesson you’ll learn about practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities that allow for the evaluation and refinement of safeguards. Plus, you’ll categorize identity-, device-, network-, application, and data-centric safeguards that enable zero trust architecture.
Assess a security system and the cultural readiness of an environment to adopt zero trust principles. Evaluate challenges to implementing ZTA principles and differentiate deployment strategies. Then map zero trust methods and analyze the inherent weaknesses of ZTA.
Perform an analysis of a sample company’s corporate profile and cybersecurity capabilities. Evaluate the company’s potential for implementing zero trust best practices and complete a road map toward a Zero Trust Architecture.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.
Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
technical mentors
median response time
Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.
Pay as you go
per
/
/