In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.
One of today's biggest problems is that network infrastructure and applications are wide open to severe security threats.
In this course, Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture, you will learn foundational knowledge to protect all valuable assets from both external and internal threats.
First, you will learn why you need to adopt a zero trust software-defined perimeter. Next, you will discover the functions of a software-defined perimeter and the advantages this will bring you. Finally, you will explore how to create a software-defined perimeter.
When you're finished with this course, you will have the skills and knowledge needed to secure your infrastructure and applications from a variety of attacks that are common today.
Course Overview Hello, my name is Matt Conran from Network Insight, and welcome to my course on Software-Defined Perimeter: Leveraging Zero Trust to Create a New Network and Security Architecture. I'm a lead network and security architect based in Ireland. In this course, we are going to discuss why we need to move to Zero Trust Software- Defined Perimeter. This boils down to a number of reasons, among the main ones is that our network and security architecture has not evolved to be in line with today's environment. We will also discuss the functions of software-defined perimeter, and the benefits it offers, such as micro- segmentation, dynamic micro perimeters, and identity-driven access control; just to name a few. We will also dive into the components used to create an SDP. Here, we will jump into some of the protocols used, such as mutual TLS and single packet authorization. If you don't adapt your network and security architecture to this new blackened approach, you'll always be playing catchup with the bad actors. By the end of this course, you will have a solid understanding of SDP, the details of why we need it, the protocols used, and the various SDP connectivity models available. I hope you join me on this journey to learn software-defined perimeter, with the Software-Defined Perimeter: Leveraging Zero Trust to Create a New Network and Security Architecture course, at Pluralsight.