Zero Trust Architecture (ZTA): Strategize and Establish

This course will teach you the steps involved in establishing a zero trust architecture.
Course info
Rating
(11)
Level
Intermediate
Updated
Dec 21, 2020
Duration
46m
Table of contents
Description
Course info
Rating
(11)
Level
Intermediate
Updated
Dec 21, 2020
Duration
46m
Description

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Lyron Andrews, and welcome to my course, Zero Trust Architecture: Strategize and Establish. I am a cloud cybersecurity consultant, authorized ISC(2) Trainer, and author. Did you know that a properly architected zero‑trust network removes the need for remote users to utilize corporate VPNs? This course will teach you the steps involved in establishing a zero‑trust architecture, which should be viewed as a maturing journey rather than a destination. First, you'll learn an introduction of the five steps to zero trust. Next, you'll discover how to identify the business protect surface and how to capture the transaction flows. Finally, you'll learn how to architect a zero‑trust network, create zero‑trust policy, and how to monitor and maintain your zero‑trust architecture. When you're finished with this course, you will have the skills and knowledge of establishing a zero‑trust architecture. Before beginning this course, you should be familiar with Zero Trust Architecture: Getting Started. I hope you'll join me on this journey to learn the five steps to zero trust with the Zero Trust Architecture: Strategize and Establish course, at Pluralsight.