We may earn an affiliate commission when you visit our partners.
Dr. Lyron H. Andrews

This course will teach you the basic understanding and applicability of zero trust.

Read more

This course will teach you the basic understanding and applicability of zero trust.

Global networks and the proliferation of data leaves valuable digital resources open to a multitude of threats when they utilize traditional protection architectures and tools. In this course, Zero Trust Architecture: Executive Briefing, you’ll learn to develop a strategy for zero trust implementation. First, you’ll explore what is zero trust and why is it needed. Next, you’ll discover how to implement a zero-trust architecture. Finally, you’ll learn how to make the business case for zero trust implementation. When you’re finished with this course, you’ll have the skills and knowledge of Zero Trust Architecture needed to develop a strategy for zero trust implementation.

Enroll now

What's inside

Syllabus

Explaining Zero Trust Architecture (ZTA)
Implementing Zero Trust Architecture (ZTA)
Understanding Resource Implications and Impact of Decisions Related to Zero Trust Architecture (ZTA)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches learners about Zero Trust Architecture, a framework to strengthen network security
Provides a practical understanding of Zero Trust Architecture implementation
Designed for professionals and leaders looking to enhance their knowledge of network security
Offers insights into the business case for Zero Trust implementation
Taught by Dr. Lyron H. Andrews, a recognized expert in Zero Trust Architecture
May require prior knowledge in network security concepts

Save this course

Save Zero Trust Architecture: Executive Briefing to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Zero Trust Architecture: Executive Briefing with these activities:
Review network security concepts
Review essential network security concepts related to zero trust, such as firewalls, intrusion detection systems, and network segmentation, to strengthen your understanding of the content covered in the course.
Show steps
  • Review notes from previous courses or read articles on network security concepts.
  • Create a list of key concepts and definitions related to network security.
  • Practice applying these concepts to real-world scenarios.
Review 'Zero Trust Networks' by Evan Gilman and Doug Barth
Gain a comprehensive understanding of zero trust concepts and implementation strategies by reviewing a leading book in the field. This will provide you with a solid foundation and valuable insights.
Show steps
  • Read the book and take notes on key concepts.
  • Summarize the main arguments and recommendations presented in the book.
  • Relate the concepts to the course material and your practical experience.
Participate in online discussions or forums on zero trust
Engage with other learners and professionals by participating in online discussions or forums. This will provide you with diverse perspectives, practical insights, and opportunities to clarify your understanding of zero trust concepts.
Show steps
  • Join online forums or discussion groups dedicated to zero trust.
  • Read through existing threads and participate in relevant discussions.
  • Ask questions, share your insights, and engage with other members.
Three other activities
Expand to see all activities and additional details
Show all six activities
Implement zero trust principles in a sandbox environment
Gain practical experience by implementing zero trust principles in a sandbox environment. This will reinforce your understanding of the implementation process and challenges involved.
Show steps
  • Set up a sandbox environment for testing.
  • Design and implement a zero trust architecture in the sandbox environment.
  • Test and evaluate the effectiveness of your implementation.
Explore open-source tools for implementing zero trust
Expand your knowledge and practical skills by exploring open-source tools specifically designed for implementing zero trust. This will enhance your understanding of the available technologies and their applications.
Show steps
  • Research and identify popular open-source tools for zero trust implementation.
  • Follow tutorials and documentation to learn how to use these tools.
  • Experiment with the tools in a sandbox environment.
Create a presentation on zero trust best practices
Deepen your understanding of zero trust best practices by creating a presentation that summarizes key principles and implementation strategies. This will help you consolidate your knowledge and effectively communicate it to others.
Show steps
  • Research and gather information on zero trust best practices.
  • Develop an outline for your presentation, including key points and supporting evidence.
  • Create slides and visuals to illustrate your content.
  • Practice your presentation and deliver it to an audience.

Career center

Learners who complete Zero Trust Architecture: Executive Briefing will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, cyberattacks, and other threats. They implement and maintain security measures, monitor network traffic for suspicious activity, and investigate and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is an essential security concept for protecting modern networks and systems.
Information Security Analyst
Information Security Analysts design, implement, and maintain security measures to protect an organization's information and computer systems. They assess risks to information security, develop and implement security plans, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a strong foundation in zero trust architecture, which is a critical security concept for protecting modern networks and systems.
Security Architect
Security Architects design and implement security measures to protect an organization's computer systems and networks. They analyze security risks, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a deep understanding of zero trust architecture, which is a key security concept for designing and implementing modern security systems.
Cloud Security Architect
Cloud Security Architects design and implement security measures to protect cloud-based systems and data. They assess risks to cloud security, develop and implement security plans, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a strong foundation in zero trust architecture, which is a critical security concept for protecting modern cloud systems.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect computer networks. They analyze network traffic for suspicious activity, configure firewalls and intrusion detection systems, and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is an essential security concept for protecting modern networks.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect computer systems and networks. They analyze security risks, develop and implement security policies, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a solid foundation in zero trust architecture, which is a key security concept for protecting modern systems and networks.
IT Security Manager
IT Security Managers plan, implement, and manage security measures to protect an organization's information technology systems. They assess risks to IT security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a critical security concept for protecting modern IT systems.
Cybersecurity Manager
Cybersecurity Managers plan, implement, and manage security measures to protect an organization's computer networks and systems from cyberattacks. They assess risks to cybersecurity, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a critical security concept for protecting modern networks and systems from cyber threats.
Information Security Officer
Information Security Officers plan, implement, and manage security measures to protect an organization's information assets. They assess risks to information security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a key security concept for protecting modern information assets.
Chief Information Security Officer
Chief Information Security Officers are responsible for developing and implementing an organization's information security strategy. They assess risks to information security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a key security concept for developing and implementing modern information security strategies.
Business Analyst
Business Analysts gather and analyze business requirements to develop and implement IT solutions. They work closely with stakeholders to understand their needs and develop solutions that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Business Analysts who are working on projects that involve security or risk management.
Project Manager
Project Managers plan, organize, and execute projects to achieve specific goals. They work with stakeholders to define project scope, develop project plans, and manage project resources. The Zero Trust Architecture: Executive Briefing course may be helpful for Project Managers who are working on projects that involve security or risk management.
Systems Analyst
Systems Analysts design, develop, and implement computer systems. They work with stakeholders to understand their needs and develop systems that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Systems Analysts who are working on projects that involve security or risk management.
Data Analyst
Data Analysts collect, analyze, and interpret data to identify trends and patterns. They use this information to make recommendations to businesses on how to improve their operations. The Zero Trust Architecture: Executive Briefing course may be helpful for Data Analysts who are working on projects that involve security or risk management.
Software Developer
Software Developers design, develop, and implement software applications. They work with stakeholders to understand their needs and develop applications that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Software Developers who are working on projects that involve security or risk management.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Zero Trust Architecture: Executive Briefing.
This practical guide outlines essential concepts, strategies, and best practices for building, operating, and maintaining zero trust networks.
Provides in-depth coverage of zero trust concepts and practical implementation guidance, making it an excellent reference for those seeking a comprehensive understanding of ZTA.
Provides a practical guide to implementing a zero trust security model. It covers topics such as identity management, network security, and data protection.
Provides insights into the human element of security and how attackers can exploit it. It also offers practical guidance on how to protect your organization from social engineering attacks.
Provides a comprehensive overview of security engineering principles and practices. It covers a wide range of topics, including authentication, authorization, and encryption.
Provides a comprehensive overview of computer networks. It covers a wide range of topics, including network protocols, routing, and security.
Provides a comprehensive overview of operating systems. It covers a wide range of topics, including process management, memory management, and file systems.
Provides a comprehensive overview of cloud computing. It covers a wide range of topics, including cloud architectures, cloud services, and cloud security.
Provides a comprehensive overview of software engineering. It covers a wide range of topics, including software design, software development, and software testing.
Provides a comprehensive overview of computer architecture. It covers a wide range of topics, including computer organization, instruction set architecture, and memory systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Zero Trust Architecture: Executive Briefing.
Zero Trust Architecture (ZTA): Use Case Identification...
Most relevant
Zero Trust Architecture (ZTA): Strategize and Establish
Most relevant
IT Security Champion: Zero Trust
Most relevant
Introduction to Zero Trust
Most relevant
Managing SUSE Linux Enterprise
Microsoft 365 Security, Compliance, and Identity Concepts
Zero Trust Security
Zero Trust Networking (ZTN): The Big Picture
Enterprise Cloud Strategy: Launching
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser