Zero Trust Architecture (ZTA): Getting Started

This course will teach you the basics of Zero Trust Architecture (ZTA) and how it is designed to keep pace with today’s threats.
Course info
Rating
(14)
Level
Intermediate
Updated
Dec 2, 2020
Duration
55m
Table of contents
Description
Course info
Rating
(14)
Level
Intermediate
Updated
Dec 2, 2020
Duration
55m
Description

Traditional network security does not keep pace with modern threats. In this course, Zero Trust Architecture (ZTA): Getting Started, you’ll learn to the basics of Zero Trust Architecture (ZTA) and how it is designed to keep pace with today’s threats. First, you’ll explore the key characteristics, origin, and justification of ZTA. Next, you’ll discover what are the logical components of a ZTA. Finally, you’ll learn how to trace and develop a ZTA journey. When you’re finished with this course, you’ll have the skills and knowledge of zero trust architecture needed to protect your organization from modern threats.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Lyron, and welcome to my course, Zero Trust Architecture: Getting Started. I am a cloud transformation and security consultant and have authored multiple official ISC2 training handbooks for the CISSP and CCSP. As a mandate was being formed for the original Department of Defense ARPA/DARPA network that became the internet, what would you say was a primary requirement that needed to be addressed? Integrity, confidentiality, or availability? If you answered availability, you are correct. And you probably also understand why the attacks available on the internet today are directly related to the focus of that original requirement back then. In this course, Zero Trust Architecture: Getting Started, you'll learn the basics of zero trust architecture and how it is designed to keep pace with today's threats. First, we will explore the key characteristics, origin, and justification of zero trust architecture. Next, we will discover what are the logical components of a zero trust architecture. Finally, you will learn how to trace and develop a zero trust architecture journey. When you're finished with this course, you'll have the skills and knowledge of zero trust architecture needed to protect your organization from modern‑day threats. I hope you'll join me on this journey to learn zero trust architecture with the Zero Trust Architecture: Getting Started course at Pluralsight.