Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Companies around the world are facing constant and evolving cyber attacks, so it’s imperative that they find talent with the dynamic skills to address these pressing issues.
01Days06Hrs50Min59Sec
At 5-10 hours/week
Get access to classroom immediately on enrollment
Learners leave the course with a reinvigorated perspective on cybersecurity and a lexicon of practices and solutions that support what is rapidly becoming the new dominant strategy in enterprise security.
Familiarity with basic cybersecurity concepts and practices.
Analyze the security approach of a recently breached company through the lens of ZT principles. By the end of this lesson, you’ll be able to distinguish between the perimeter network security model and the zero trust security model, identify areas that can be improved with ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in implementing a ZTA.
Identify the philosophical principles behind the zero trust movement. Additionally, this lesson focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the pillars of the zero trust security model.
In this lesson you’ll learn about practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities that allow for the evaluation and refinement of safeguards. Plus, you’ll categorize identity-, device-, network-, application, and data-centric safeguards that enable zero trust architecture.
Assess a security system and the cultural readiness of an environment to adopt zero trust principles. Evaluate challenges to implementing ZTA principles and differentiate deployment strategies. Then map zero trust methods and analyze the inherent weaknesses of ZTA.
Perform an analysis of a sample company’s corporate profile and cybersecurity capabilities. Evaluate the company’s potential for implementing zero trust best practices and complete a road map toward a Zero Trust Architecture.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.
Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
Richard is an SSCP, CISSP, and CIPP/US with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds a BA in Psychology from Hendrix College and a Master's of Education from Lesley University.
Learn the fundamentals of the zero trust security model and build the confidence to utilize this modern approach to enterprise cybersecurity, as established by federal guidelines.
On average, successful students take 1 month to complete this program.
No. This course accepts all applicants regardless of experience and specific background.
To be successful in this Zero Trust Security course, learners should already have familiarity with:
This Zero Trust Security course consists of content and curriculum to support one project. We estimate that students can complete the program in 1 month.
The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.
Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.
Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
There are no software and version requirements to complete this course. All coursework and projects can be completed with a word processor and web browser.