Skip to content

Zero Trust Security


Companies around the world are facing constant and evolving cyber attacks, so it’s imperative that they find talent with the dynamic skills to address these pressing issues.

Enroll Now


  • Estimated time
    1 month

    At 5-10 hours/week

  • Enroll by
    December 14, 2022

    Get access to classroom immediately on enrollment

  • Prerequisites
    Familiarity with basic cybersecurity concepts and practices

What you will learn

  1. Zero Trust Security

    Estimated 1 month to complete

    Learners leave the course with a reinvigorated perspective on cybersecurity and a lexicon of practices and solutions that support what is rapidly becoming the new dominant strategy in enterprise security.

    Prerequisite knowledge

    1. Introduction to Zero Trust

      Analyze the security approach of a recently breached company through the lens of ZT principles. By the end of this lesson, you’ll be able to distinguish between the perimeter network security model and the zero trust security model, identify areas that can be improved with ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in implementing a ZTA.

      • Zero Trust Security Concepts

        Identify the philosophical principles behind the zero trust movement. Additionally, this lesson focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the pillars of the zero trust security model.

        • Zero Trust Methods

          In this lesson you’ll learn about practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities that allow for the evaluation and refinement of safeguards. Plus, you’ll categorize identity-, device-, network-, application, and data-centric safeguards that enable zero trust architecture.

          • Organizational Practices

            Assess a security system and the cultural readiness of an environment to adopt zero trust principles. Evaluate challenges to implementing ZTA principles and differentiate deployment strategies. Then map zero trust methods and analyze the inherent weaknesses of ZTA.

            • Course Project: Zero Trust Road Map

              Perform an analysis of a sample company’s corporate profile and cybersecurity capabilities. Evaluate the company’s potential for implementing zero trust best practices and complete a road map toward a Zero Trust Architecture.

            All our programs include:

            • Real-world projects from industry experts

              With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

            • Technical mentor support

              Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.

            • Quizzes

              Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.

            • Flexible learning program

              Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

            Course offerings

            • Class content

              • Real-world projects
              • Project reviews
              • Project feedback from experienced reviewers
            • Student services

              • Technical mentor support
              • Student community

            Succeed with personalized services.

            We provide services customized for your needs at every step of your learning journey to ensure your success.

            Get timely feedback on your projects.

            • Personalized feedback
            • Unlimited submissions and feedback loops
            • Practical tips and industry best practices
            • Additional suggested resources to improve
            • 1,400+

              project reviewers

            • 2.7M

              projects reviewed

            • 88/100

              reviewer rating

            • 1.1 hours

              avg project review turnaround time

            Learn with the best.

            Learn with the best.

            • Richard Phung

              Asst. Director, Infrastructure Operations and Security

              Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.

            Zero Trust Security

            Get started today

            • Monthly access

              Pay as you go




              Enroll now
              • Maximum flexibility to learn at your own pace.
              • Cancel anytime.
            • Learn

            • Average Time

            • Benefits include

            Program details

            • Do I need to apply? What are the admission criteria?
            • What are the prerequisites for enrollment?
            • How is this course structured?
            • How long is this course?
            • Can I switch my start date? Can I get a refund?
            • What software and versions will I need in this course?

            Zero Trust Security

            Enroll Now