Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Understanding Zero Trust

via LinkedIn Learning

Overview

Learn to operate with a zero trust approach to network security.

Syllabus

Introduction
  • Using Zero Trust to protect against cyberattack
  • What you should know
1. Background
  • A brief history of technology trust
  • Concepts of software trust
  • A case study in failed trust
2. Zero Trust
  • What is Zero Trust?
  • The principles of Zero Trust
  • ACT-IAC and the six pillars of Zero Trust
  • Policy-based admission control
  • Zero Trust and the business context
  • Zero Trust data
  • An extended approach to Zero Trust
3. Implementing Zero Trust
  • Building a Zero Trust foundation
  • Designing a policy engine
  • Examples of Zero Trust
Conclusion
  • What's next?

Taught by

Malcolm Shore

Reviews

4.5 rating at LinkedIn Learning based on 233 ratings

Start your review of Understanding Zero Trust

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.