Udacity Logo
Log InJoin for Free

Zero Trust Security

Course

This course introduces the zero trust security model, a dynamic approach to addressing the continual evolution of cybersecurity threats for organizations that demand flexibility and scalability in modern work environments. Traditional security models that rely on strong outer defenses are no longer viable strategies to protect a company’s valuable assets. Students who complete this course will be able to critically examine corporate security practices against the philosophy of “Never Trust, Always Verify”, and will be empowered to advocate for Zero Trust Architecture initiatives.

This course introduces the zero trust security model, a dynamic approach to addressing the continual evolution of cybersecurity threats for organizations that demand flexibility and scalability in modern work environments. Traditional security models that rely on strong outer defenses are no longer viable strategies to protect a company’s valuable assets. Students who complete this course will be able to critically examine corporate security practices against the philosophy of “Never Trust, Always Verify”, and will be empowered to advocate for Zero Trust Architecture initiatives.

Intermediate

4 weeks

Real-world Projects

Completion Certificate

Last Updated August 2, 2022

Skills you'll learn:
Zero Trust Algorithms • Zero Trust Deployment Strategy • Zero trust security model • Zero Trust Maturity Model
Prerequisites:
Cybersecurity fluency • Application architecture • Computer networking basics

Course Lessons

Lesson 1

Introduction to Zero Trust Security

This lesson serves as an introduction to the course. By exploring zero trust core values and recent trends in cybersecurity, we demonstrate why this approach to security matters now more than ever.

Lesson 2

Zero Trust Security Concepts

This lesson is a review of the core components required to implement a zero trust security system and how policy-based management systems allow us to "Never Trust, Always Verify".

Lesson 3

Zero Trust Methods

This lesson focuses on the solutions and controls that can be implemented to introduce zero trust principles to any environment.

Lesson 4

Organizational Practices

This lesson focuses on the selection and implementation of zero trust security controls through organizational practices.

Lesson 5 • Project

Zero Trust Road Map

In this project, you will demonstrate your mastery of zero trust security concepts by recommending controls to revamp our company's security program!

Taught By The Best

Photo of Richard Phung

Richard Phung

INFORMATION SECURITY ANALYST

Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills

Unlock access to Zero Trust Security and the rest of our best-in-class catalog

  • Unlimited access to our top-rated courses

  • Real-world projects

  • Personalized project reviews

  • Program certificates

  • Proven career outcomes

Full Catalog Access

One subscription opens up this course and our entire catalog of projects and skills.

Month-To-Month

4 Months

Average time to complete a Nanodegree program

*Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.

Get Started Today

Zero Trust Security

Month-To-Month


  • Unlimited access to our top-rated courses
  • Real-world projects
  • Personalized project reviews
  • Program certificates
  • Proven career outcomes

4 Months

Average time to complete a Nanodegree program

  • All the same great benefits in our month-to-month plan
  • Most cost-effective way to acquire a new set of skills
Discount applies to the first 4 months of membership, after which plans are converted to month-to-month.