Simple play icon Course
Skills

Zero Trust Architecture (ZTA): Use Case Identification and Implementation

by Dr. Lyron H. Andrews

Zero trust architecture provides the basis for greater security assurance. This course will teach you to identify, develop, and implement use cases for zero trust architecture.

What you'll learn

Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.

Course FAQ

What will you learn in this Zero Trust Architecture course?

In this course, you will learn about multiple systems and services, various user types, and how to identify unique use cases within your Zero Trust Architecture.

Are there any prerequisites for this cyber security course?

Prerequisites for this course are the basics of Zero Trust Architecture. A great way to get familiar with ZTA would be our Pluralsight course: Zero Trust Architecture (ZTA): Getting Started.

What are some challenges of Zero Trust implementation?

Some popular challenges to implementing a Zero Trust security model are: security gaps emerging when using a piecemeal approach, failure to commit to ongoing administration after implementing a Zero Trust model, and productivity lapses when first implementing a Zero Trust model.

What is a transaction flow?

Transactions are a sequence of operations, some of which are performed by a system, person, or device that are outside of the system. Transaction flows are introduced as a representation of a system's processing.

What types of use cases will you see in this Zero Trust Architecture course?

In this course, you will learn about multi cloud, mobile device, and work from home ZTA scenarios.

About the author

Dr. Andrews’ technology career spans three decades. His roles included network manager New York City Department of Education, BMG Direct senior director of IT, and BNY Mellon dean of technology. His doctoral research at Teachers College Columbia found that critical thinking skills thrive in environments that are supportive of five essential elements in the mind of a critical thinker. He teaches cyber security. He has integrated technology management with teaching at Columbia University and other... more

Ready to upskill? Get started