Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Zero Trust Architecture (ZTA): Use Case Identification and Implementation

Zero trust architecture provides the basis for greater security assurance. This course will teach you to identify, develop, and implement use cases for zero trust architecture.

Dr. Lyron H. Andrews - Pluralsight course - Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Dr. Lyron H. Andrews
What you'll learn

Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.

Table of contents

About the author
Dr. Lyron H. Andrews - Pluralsight course - Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Dr. Lyron H. Andrews

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight