We may earn an affiliate commission when you visit our partners.
Dr. Lyron H. Andrews

This course will teach you the steps involved in establishing a zero trust architecture.

Read more

This course will teach you the steps involved in establishing a zero trust architecture.

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

Enroll now

What's inside

Syllabus

Course Overview
Preparing for the Five-step Path to Zero Trust
Establishing the Protect Surface, Transaction Flows, and Architecture
Building a Zero Trust Policy and a Monitoring Schema
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores zero trust architecture, a relevant topic in cybersecurity
Taught by Dr. Lyron H. Andrews, a recognized expert in cybersecurity
Offers a step-by-step approach to establishing a zero trust architecture
Covers essential aspects of zero trust, including identifying the protect surface and creating a zero trust policy
Provides practical guidance on monitoring and maintaining a zero trust architecture

Save this course

Save Zero Trust Architecture (ZTA): Strategize and Establish to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Zero Trust Architecture (ZTA): Strategize and Establish with these activities:
Review zero trust basics
Brush up on the basic principles of zero trust to better understand the course material.
Browse courses on Zero Trust
Show steps
  • Read articles on zero trust fundamentals
  • Review vendor documentation on zero trust
  • Watch videos on zero trust concepts
Review course materials and notes
Regularly review course materials and notes to reinforce your understanding of the concepts.
Show steps
  • Read the course textbook
  • Review lecture notes
  • Complete practice exercises
Participate in discussion forums
Engage in discussions with peers to exchange ideas and clarify concepts.
Show steps
  • Post questions to the discussion forum
  • Respond to questions from other students
  • Attend live discussions
Five other activities
Expand to see all activities and additional details
Show all eight activities
Set up a zero trust network using a vendor solution
Follow guided tutorials to set up a zero trust network using a vendor-provided solution.
Browse courses on network security
Show steps
  • Choose a zero trust vendor
  • Follow the vendor's documentation to set up the zero trust network
  • Test the zero trust network
Design a zero trust network architecture
Create a visual representation of a zero trust network architecture to solidify your understanding of the concepts.
Browse courses on Zero Trust Architecture
Show steps
  • Identify the components of a zero trust network
  • Map out the relationships between the components
  • Document the architecture using a diagram or other visual representation
Attend a zero trust workshop
Attend a zero trust workshop to learn from experts and engage in hands-on activities.
Browse courses on Zero Trust
Show steps
  • Research zero trust workshops
  • Register for a zero trust workshop
  • Attend the zero trust workshop
Configure a zero trust policy
Practice configuring zero trust policies to gain hands-on experience with implementing zero trust principles.
Browse courses on Security Policy
Show steps
  • Identify the different types of zero trust policies
  • Write a zero trust policy for a specific use case
  • Test the zero trust policy
Develop a zero trust adoption plan
Create a plan to adopt zero trust in your organization to apply the course concepts in a practical setting.
Browse courses on network security
Show steps
  • Assess your organization's current security posture
  • Develop a roadmap for zero trust adoption
  • Create a budget for zero trust adoption
  • Identify the stakeholders involved in zero trust adoption
  • Develop a communication plan for zero trust adoption

Career center

Learners who complete Zero Trust Architecture (ZTA): Strategize and Establish will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts design, implement, and manage information security systems, such as intrusion detection systems, security information and event management (SIEM) systems, and access control systems. They may specialize in a particular type of information security, such as cloud security or incident response. This course would be helpful for Information Security Analysts by providing them with an understanding of the principles of zero trust architecture and how to implement it in an information security system.
Security Architect
Security Architects plan and design the security infrastructure for an organization, including network security, application security, and data security. They may specialize in a particular type of security, such as cloud security or enterprise security. This course would be helpful for Security Architects by providing them with an understanding of the principles of zero trust architecture and how to implement it in an organization.
IT Security Manager
IT Security Managers oversee the security of an organization's IT systems and data. They may be responsible for developing and implementing security policies, managing security budgets, and responding to security incidents. This course would be helpful for IT Security Managers by providing them with an understanding of the principles of zero trust architecture and how to implement it in an organization.
Cloud Security Analyst
Cloud Security Analysts design and implement cloud security architectures and protect cloud-based assets from unauthorized access. They may specialize in cloud security for a particular industry or organization. This course would be helpful in building a foundation for anyone interested in becoming a Cloud Security Analyst by providing an understanding of the principles of zero trust architecture.
Network Security Engineer
Network Security Engineers design, implement, and manage network security systems, such as firewalls, intrusion detection systems, and virtual private networks (VPNs). They may specialize in a particular type of network security, such as cloud security or enterprise security. This course would be helpful for Network Security Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a network.
Privacy Analyst
Privacy Analysts ensure that organizations protect the privacy of their customers and employees. They may develop and implement privacy policies, conduct privacy impact assessments, and respond to data breaches. This course would be helpful for Privacy Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to protect privacy.
Incident Responder
Incident Responders respond to security incidents. They may be responsible for investigating incidents, containing damage, and restoring systems. This course would be helpful for Incident Responders by providing them with an understanding of the principles of zero trust architecture and how to use it to respond to security incidents.
Compliance Analyst
Compliance Analysts ensure that organizations comply with laws and regulations. They may review policies and procedures, conduct audits, and develop compliance training programs. This course would be helpful for Compliance Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to ensure compliance with laws and regulations.
Penetration Tester
Penetration Testers assess the security of computer systems, networks, and applications by simulating attacks. They identify vulnerabilities and report their findings to organizations so that they can be fixed. This course would be helpful for Penetration Testers by providing them with an understanding of the principles of zero trust architecture and how to use it to assess the security of systems.
Data Scientist
Data Scientists use data to solve business problems. They may be responsible for collecting, cleaning, and analyzing data to identify trends and patterns. This course would be helpful for Data Scientists by providing them with an understanding of the principles of zero trust architecture and how to use it to protect data from unauthorized access.
Security Auditor
Security Auditors assess the security of organizations' IT systems and data. They may review security policies, perform security assessments, and recommend improvements. This course would be helpful for Security Auditors by providing them with an understanding of the principles of zero trust architecture and how to use it to assess the security of systems.
Business Analyst
Business Analysts identify and solve business problems. They may work with stakeholders to gather requirements, analyze data, and develop solutions. This course would be helpful for Business Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to protect business data and systems from unauthorized access.
Risk Analyst
Risk Analysts identify and assess risks to organizations. They may work with stakeholders to develop and implement risk management plans. This course would be helpful for Risk Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to identify and mitigate risks to organizations.
DevOps Engineer
DevOps Engineers work with developers and operations teams to ensure that software is delivered quickly and securely. They may be responsible for building and maintaining the infrastructure that supports software development and deployment. This course would be helpful for DevOps Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a DevOps environment.
Cloud Engineer
Cloud Engineers design, build, and manage cloud computing systems. They may be responsible for migrating applications to the cloud, managing cloud infrastructure, and developing cloud-based solutions. This course would be helpful for Cloud Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a cloud environment.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Zero Trust Architecture (ZTA): Strategize and Establish.
Provides a practical guide to implementing and managing a zero trust architecture. It covers the key steps involved in implementing a zero trust architecture, as well as the challenges that you may encounter.
Provides a business-oriented perspective on zero trust security. It covers the benefits of zero trust security, as well as the challenges of implementing a zero trust architecture.
Provides a technical deep dive into the zero trust model. It covers the principles of zero trust, as well as the specific technologies and practices that can be used to implement a zero trust architecture.
Offers a comprehensive yet accessible overview of cloud security, touching on some topics that are only directly relevant to Zero Trust in limited cases.
Provides a practical guide to implementing a zero trust security architecture. It covers the key steps involved in implementing a zero trust security architecture, as well as the challenges that you may encounter.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Zero Trust Architecture (ZTA): Strategize and Establish.
Zero Trust Architecture (ZTA): Use Case Identification...
Most relevant
Introduction to Zero Trust
Most relevant
Zero Trust Architecture: Executive Briefing
Most relevant
Managing SUSE Linux Enterprise
Most relevant
Zero Trust Networking (ZTN): The Big Picture
Most relevant
Enterprise Perimeter and Network Security
Most relevant
IT Security Champion: Zero Trust
Most relevant
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Lateral Movement with Infection Monkey
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser