Zero Trust Security

Go to class
Write Review

Free Online Course: Zero Trust Security provided by Udacity is a comprehensive online course. The course is taught in English and is free of charge. Zero Trust Security is taught by cd11535 Richard Phung.

Overview
  • Companies around the world are facing constant and evolving cyber attacks, so it’s imperative that they find talent with the dynamic skills to address these pressing issues.

Syllabus
    • Introduction to Zero Trust
      • Analyze the security approach of a recently breached company through the lens of ZT principles. By the end of this lesson, you’ll be able to distinguish between the perimeter network security model and the zero trust security model, identify areas that can be improved with ZT principles, identify recent cybersecurity trends that paved the way for ZT security models, and differentiate key stakeholders in implementing a ZTA.
    • Zero Trust Security Concepts
      • Identify the philosophical principles behind the zero trust movement. Additionally, this lesson focuses on the foundational requirements for zero trust security, the logical components required to enforce ZT, and the pillars of the zero trust security model.
    • Zero Trust Methods
      • In this lesson you’ll learn about practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities that allow for the evaluation and refinement of safeguards. Plus, you’ll categorize identity-, device-, network-, application, and data-centric safeguards that enable zero trust architecture.
    • Organizational Practices
      • Assess a security system and the cultural readiness of an environment to adopt zero trust principles. Evaluate challenges to implementing ZTA principles and differentiate deployment strategies. Then map zero trust methods and analyze the inherent weaknesses of ZTA.
    • Course Project: Zero Trust Road Map
      • Perform an analysis of a sample company’s corporate profile and cybersecurity capabilities. Evaluate the company’s potential for implementing zero trust best practices and complete a road map toward a Zero Trust Architecture.