Overview
This course aims to help learners understand the concept of Zero Trust in the context of cybersecurity. By the end of the course, students will be able to identify trends in cybersecurity, implement a Zero Trust approach, and enhance identity and data governance. The course covers topics such as network security, identity attacks, least privilege, and automation. The teaching method includes lectures on various aspects of Zero Trust, its impact, and practical implementation strategies. This course is intended for security specialists, decision-makers, entrepreneurs, developers, and anyone interested in enhancing their knowledge of cybersecurity practices.
Syllabus
Intro
Agenda
Trends in Cyber Security
Shift in Mindset
Security
Network Security
Identity Attacks
What is Zero Trust
The Reality of Zero Trust
Zero Trust Approach
Identities
Devices
Least Privilege
Identity Governance
Data Governance
Regular Basic Attacks
How Long Does It Take
What Could They Do
Assumptions
Automation
Zero Trust Overview
Zero Trust Impact
Microsoft Maturity Model
CSA Maturity Model
Summary
What to do
Questions
Taught by
DefCamp