Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Zero trust architecture provides the basis for greater security assurance. This course will teach you to identify, develop, and implement use cases for zero trust architecture.
What you'll learn
Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.
Table of contents
Course FAQ
In this course, you will learn about multiple systems and services, various user types, and how to identify unique use cases within your Zero Trust Architecture.
Prerequisites for this course are the basics of Zero Trust Architecture. A great way to get familiar with ZTA would be our Pluralsight course: Zero Trust Architecture (ZTA): Getting Started.
Some popular challenges to implementing a Zero Trust security model are: security gaps emerging when using a piecemeal approach, failure to commit to ongoing administration after implementing a Zero Trust model, and productivity lapses when first implementing a Zero Trust model.
Transactions are a sequence of operations, some of which are performed by a system, person, or device that are outside of the system. Transaction flows are introduced as a representation of a system's processing.
In this course, you will learn about multi cloud, mobile device, and work from home ZTA scenarios.