Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Zero Trust Architecture (ZTA): Use Case Identification and Implementation

Zero trust architecture provides the basis for greater security assurance. This course will teach you to identify, develop, and implement use cases for zero trust architecture.

Dr Lyron H Andrews - Pluralsight course - Zero Trust Architecture (ZTA): Use Case Identification and Implementation
by Dr Lyron H Andrews

What you'll learn

Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.

Table of contents

About the author

Dr Lyron H Andrews - Pluralsight course - Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Dr Lyron H Andrews

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More Courses by Dr