Essentially, with Zero Trust Networking, the network is entirely dark to everything
and everyone until the administrator turns the lights on. You will go through technologies and introduced to new networking and security architectures.
Initially, networks were designed solely for connectivity i.e to share a printer. Back 30
years ago a printer could cost the same as a house so it was pretty important to be
able to share it. In this course, Zero Trust Networking (ZTN): The Big Picture, you will learn foundational knowledge and gain the ability to evolve your network to match the new digital world and combat the bad actors both internal and external to your network. First, you will learn why we need Zero Trust Networking. Next, you will discover some of the components used to create a new network and security model and a good understanding of how Zero Trust Networking works. Finally, you will explore how to two Zero Trust projects of Microsegmention and Software-defined perimeter. When you’re finished with this course, you will have the skills and knowledge of Zero Trust Networking needed to match the new digital age and combat bad actors both internal and external to your network.
Course Overview (Music) Hello. My name is Matt Conran from Network Insight, and I would like to welcome you to this course that I designed to introduce you to Zero Trust Networking. The digital environment is amongst us, so we have to change our network and secure the architectures to suit this new environment. Over the coming modules, I'll provide you with a solid understanding of why we need Zero Trust Networking. In this module, we'll focus on how traditional network and security designs are no longer effective with the changes we are seeing in the digital age. Traditional firewalling and network access control designs are left useless and have no effect on the new traffic patterns and increased internal tracks to the organization. Then I will introduce to you some of the components involved in creating this new network and security model. We now have the option to no longer use IP addresses and their tree routing should become more intelligent. The design of network must change to stop attacks and edge as opposed to inside of network like they do today. Then I will provide you with an understanding of how Zero Trust Networking works. We will focus on its history and how we arrived at Zero Trust and why this approach to network and security. Finally, we will end discussing the two main Zero Trust Networking projects, micro-segmentation and software defined perimeter.