Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture

In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.
Course info
Level
Intermediate
Updated
Aug 20, 2019
Duration
1h 34m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 20, 2019
Duration
1h 34m
Description

One of today's biggest problems is that network infrastructure and applications are wide open to severe security threats. In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats. First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter. When you're finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today.

About the author
About the author

Matt Conran is a lead Network & Security Architect and successfully delivered major global greenfield service provider and data center networks.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] My name is not common from Network Insight. Look into my course on suffering. Find printer. Leveraging zero Trust to create a new network and security architecture. I'ma leave network and security architect based on are in this course we're gonna discuss why we need to move to zero. Chill, suffer, find perimeter. This boils down to a number of reasons. Come on. The main ones that our network and secure your picture has not evolved to be in line with today's environment. We would also discuss the functions of self refined perimeter on the benefits that offers such a micro segmentation dynamic micro perimeters on identity driven access control. Just name a few. We would also dive into the components huge to create an STP. Here we will jump into similar protocols. You such a mutual t less on single pocket authorization. If you don't adopt your network and security architecture to just new black and approach, you will always be playing. Catch it with the bad actors my game, this course You would have a solid understanding of STP. The deacons are why we needed the protocols used on the various STP connected the models available. I hope you join me on this journey To learn software defined perimeter With this software, Find perimeter leveraging zero Trust to create a new network and security architecture course plural site.