Zero Trust Architecture (ZTA)

Paths

Zero Trust Architecture (ZTA)

Author: Lyron Andrews

This skill will teach you a basic understanding and applicability of Zero Trust Architecture (ZTA).

What you will learn:

  • Examining the foundational concepts of Zero Trust Architecture basics
  • Define zero trust architecture and why it is critically needed
  • How to employ Zero Trust Architecture
  • Establishing a Zero Trust Architecture
  • Understanding resource implications and impact of decisions related to Zero Trust Architecture
  • Determining deployment scenarios and use cases for Zero Trust Architecture
  • Migrating to and maturing Zero Trust Architecture

Pre-requisites

Basic networking knowledge

Zero Trust Architecture (ZTA) courses

The intention of this skill is to help you understand the foundational concepts of Zero Trust Architecture (ZTA), when and how to employ it, as well as understanding the resource implications and related decisions that need to be made. We also cover determining the deployment scenarios and use cases for ZTA, as well as migrating to and maturing associated programs.

You will gain a full understanding of the subject by studying the following courses:

  • Zero Trust Architecture (ZTA): Getting Started
  • Establishing a Zero Trust Architecture (ZTA)
  • Determining deployment scenarios and use cases for Zero Trust Architecture (ZTA)
  • Migrating to and maturing Zero Trust Architecture (ZTA)

Zero Trust Architecture (ZTA): Getting Started

by Lyron Andrews

Dec 2, 2020 / 55m

55m

Start Course
Description

Traditional network security does not keep pace with modern threats. In this course, Zero Trust Architecture (ZTA): Getting Started, you’ll learn to the basics of Zero Trust Architecture (ZTA) and how it is designed to keep pace with today’s threats. First, you’ll explore the key characteristics, origin, and justification of ZTA. Next, you’ll discover what are the logical components of a ZTA. Finally, you’ll learn how to trace and develop a ZTA journey. When you’re finished with this course, you’ll have the skills and knowledge of zero trust architecture needed to protect your organization from modern threats.

Table of contents
  1. Course Overview
  2. Identifying the Historical Trajectory of ZTA
  3. Enumerating the Logical Components of Zero Trust
  4. Defining ZTA Implementations and Frameworks

Zero Trust Architecture (ZTA): Strategize and Establish

by Lyron Andrews

Dec 21, 2020 / 46m

46m

Start Course
Description

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

Table of contents
  1. Course Overview
  2. Preparing for the Five-step Path to Zero Trust
  3. Establishing the Protect Surface, Transaction Flows, and Architecture
  4. Building a Zero Trust Policy and a Monitoring Schema

Zero Trust Architecture (ZTA): Use Case Identification and Implementation

by Lyron Andrews

Apr 16, 2021 / 46m

46m

Start Course
Description

Zero trust architecture provides the basis for greater security assurance. In this course, Zero Trust Architecture (ZTA) Use Cases, you’ll learn applicable use cases for implementing zero trust. First, you’ll explore use cases tied to multiple systems and services. Next, you’ll discover use cases connected to various user types. Finally, you’ll learn how to identify your unique use cases and prototype zero trust architecture implementation. When you’re finished with this course, you’ll have the skills and knowledge of use case identification and execution needed to establish your zero trust architecture.

Table of contents
  1. Course Overview
  2. Defining ZTA Use Case Scenarios for Systems and Services
  3. Defining ZTA Use Case Scenarios for Users
  4. Creating Bespoke ZTA Use Cases

Coming Soon

Zero Trust Architecture (ZTA): Migration, Review and Maturation

Coming Soon

by Pluralsight