Expanded

Zero Trust Architecture (ZTA): Use Case Identification and Implementation

Zero trust architecture provides the basis for greater security assurance. This course will teach you to identify, develop, and implement use cases for zero trust architecture.
Course info
Level
Intermediate
Updated
Apr 16, 2021
Duration
46m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 16, 2021
Duration
46m
Description

Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Lyron Andrews, and welcome to my course, Zero Trust Architecture Use Case Identification and Implementation. I am a cloud cybersecurity advisor, authorized ISC2 trainer, and author. Did you know that the granularity of zero trust monitoring has raised concerns regarding data privacy in regulatory practices and laws around the world? This course will teach you to identify, develop, and implement use cases for zero trust architecture. First, you'll explore use cases tied to multiple systems and services. Next, you'll discover use cases connected to various user types. Finally, you'll learn how to identify your unique use case and prototype zero trust architecture implementation. When you're finished with this course, you'll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture. Before beginning the course, you should be familiar with Zero Trust Architecture (ZTA): Getting Started. I hope you'll join me on this journey to learn how to use zero trust use case implementations with the Zero Trust Architecture Use Case Identification and Implementation, course at Pluralsight.