We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Zero Trust Architecture

Executive Briefing

Dr. Lyron H. Andrews

This course will teach you the basic understanding and applicability of zero trust.

Read more

This course will teach you the basic understanding and applicability of zero trust.

Global networks and the proliferation of data leaves valuable digital resources open to a multitude of threats when they utilize traditional protection architectures and tools. In this course, Zero Trust Architecture: Executive Briefing, you’ll learn to develop a strategy for zero trust implementation. First, you’ll explore what is zero trust and why is it needed. Next, you’ll discover how to implement a zero-trust architecture. Finally, you’ll learn how to make the business case for zero trust implementation. When you’re finished with this course, you’ll have the skills and knowledge of Zero Trust Architecture needed to develop a strategy for zero trust implementation.

Enroll now

What's inside

Syllabus

Explaining Zero Trust Architecture (ZTA)
Implementing Zero Trust Architecture (ZTA)
Understanding Resource Implications and Impact of Decisions Related to Zero Trust Architecture (ZTA)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches learners about Zero Trust Architecture, a framework to strengthen network security
Provides a practical understanding of Zero Trust Architecture implementation
Designed for professionals and leaders looking to enhance their knowledge of network security
Offers insights into the business case for Zero Trust implementation
Taught by Dr. Lyron H. Andrews, a recognized expert in Zero Trust Architecture
May require prior knowledge in network security concepts

Save this course

Save Zero Trust Architecture: Executive Briefing to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Zero Trust Architecture: Executive Briefing. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Zero Trust Architecture: Executive Briefing will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, cyberattacks, and other threats. They implement and maintain security measures, monitor network traffic for suspicious activity, and investigate and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is an essential security concept for protecting modern networks and systems.
Information Security Analyst
Information Security Analysts design, implement, and maintain security measures to protect an organization's information and computer systems. They assess risks to information security, develop and implement security plans, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a strong foundation in zero trust architecture, which is a critical security concept for protecting modern networks and systems.
Security Architect
Security Architects design and implement security measures to protect an organization's computer systems and networks. They analyze security risks, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a deep understanding of zero trust architecture, which is a key security concept for designing and implementing modern security systems.
Cloud Security Architect
Cloud Security Architects design and implement security measures to protect cloud-based systems and data. They assess risks to cloud security, develop and implement security plans, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a strong foundation in zero trust architecture, which is a critical security concept for protecting modern cloud systems.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect computer networks. They analyze network traffic for suspicious activity, configure firewalls and intrusion detection systems, and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is an essential security concept for protecting modern networks.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect computer systems and networks. They analyze security risks, develop and implement security policies, and monitor and respond to security incidents. The Zero Trust Architecture: Executive Briefing course will provide you with a solid foundation in zero trust architecture, which is a key security concept for protecting modern systems and networks.
IT Security Manager
IT Security Managers plan, implement, and manage security measures to protect an organization's information technology systems. They assess risks to IT security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a critical security concept for protecting modern IT systems.
Cybersecurity Manager
Cybersecurity Managers plan, implement, and manage security measures to protect an organization's computer networks and systems from cyberattacks. They assess risks to cybersecurity, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a critical security concept for protecting modern networks and systems from cyber threats.
Information Security Officer
Information Security Officers plan, implement, and manage security measures to protect an organization's information assets. They assess risks to information security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a key security concept for protecting modern information assets.
Chief Information Security Officer
Chief Information Security Officers are responsible for developing and implementing an organization's information security strategy. They assess risks to information security, develop and implement security policies, and manage security infrastructure. The Zero Trust Architecture: Executive Briefing course will provide you with a comprehensive understanding of zero trust architecture, which is a key security concept for developing and implementing modern information security strategies.
Business Analyst
Business Analysts gather and analyze business requirements to develop and implement IT solutions. They work closely with stakeholders to understand their needs and develop solutions that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Business Analysts who are working on projects that involve security or risk management.
Project Manager
Project Managers plan, organize, and execute projects to achieve specific goals. They work with stakeholders to define project scope, develop project plans, and manage project resources. The Zero Trust Architecture: Executive Briefing course may be helpful for Project Managers who are working on projects that involve security or risk management.
Systems Analyst
Systems Analysts design, develop, and implement computer systems. They work with stakeholders to understand their needs and develop systems that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Systems Analysts who are working on projects that involve security or risk management.
Data Analyst
Data Analysts collect, analyze, and interpret data to identify trends and patterns. They use this information to make recommendations to businesses on how to improve their operations. The Zero Trust Architecture: Executive Briefing course may be helpful for Data Analysts who are working on projects that involve security or risk management.
Software Developer
Software Developers design, develop, and implement software applications. They work with stakeholders to understand their needs and develop applications that meet their business objectives. The Zero Trust Architecture: Executive Briefing course may be helpful for Software Developers who are working on projects that involve security or risk management.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Zero Trust Architecture: Executive Briefing.
This practical guide outlines essential concepts, strategies, and best practices for building, operating, and maintaining zero trust networks.
Provides in-depth coverage of zero trust concepts and practical implementation guidance, making it an excellent reference for those seeking a comprehensive understanding of ZTA.
Provides a practical guide to implementing a zero trust security model. It covers topics such as identity management, network security, and data protection.
Provides insights into the human element of security and how attackers can exploit it. It also offers practical guidance on how to protect your organization from social engineering attacks.
Provides a comprehensive overview of security engineering principles and practices. It covers a wide range of topics, including authentication, authorization, and encryption.
Provides a comprehensive overview of computer networks. It covers a wide range of topics, including network protocols, routing, and security.
Provides a comprehensive overview of operating systems. It covers a wide range of topics, including process management, memory management, and file systems.
Provides a comprehensive overview of cloud computing. It covers a wide range of topics, including cloud architectures, cloud services, and cloud security.
Provides a comprehensive overview of software engineering. It covers a wide range of topics, including software design, software development, and software testing.
Provides a comprehensive overview of computer architecture. It covers a wide range of topics, including computer organization, instruction set architecture, and memory systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Zero Trust Architecture: Executive Briefing.
Zero Trust Architecture (ZTA): Use Case Identification...
Most relevant
Zero Trust Architecture (ZTA): Strategize and Establish
Most relevant
IT Security Champion: Zero Trust
Most relevant
Introduction to Zero Trust
Most relevant
Managing SUSE Linux Enterprise
Microsoft 365 Security, Compliance, and Identity Concepts
Zero Trust Security
Zero Trust Networking (ZTN): The Big Picture
Enterprise Cloud Strategy: Launching
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser