We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Zero Trust Architecture (ZTA)

Strategize and Establish

Dr. Lyron H. Andrews

This course will teach you the steps involved in establishing a zero trust architecture.

Read more

This course will teach you the steps involved in establishing a zero trust architecture.

Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.

Enroll now

What's inside

Syllabus

Course Overview
Preparing for the Five-step Path to Zero Trust
Establishing the Protect Surface, Transaction Flows, and Architecture
Building a Zero Trust Policy and a Monitoring Schema
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores zero trust architecture, a relevant topic in cybersecurity
Taught by Dr. Lyron H. Andrews, a recognized expert in cybersecurity
Offers a step-by-step approach to establishing a zero trust architecture
Covers essential aspects of zero trust, including identifying the protect surface and creating a zero trust policy
Provides practical guidance on monitoring and maintaining a zero trust architecture

Save this course

Save Zero Trust Architecture (ZTA): Strategize and Establish to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Zero Trust Architecture (ZTA): Strategize and Establish. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Zero Trust Architecture (ZTA): Strategize and Establish will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts design, implement, and manage information security systems, such as intrusion detection systems, security information and event management (SIEM) systems, and access control systems. They may specialize in a particular type of information security, such as cloud security or incident response. This course would be helpful for Information Security Analysts by providing them with an understanding of the principles of zero trust architecture and how to implement it in an information security system.
Security Architect
Security Architects plan and design the security infrastructure for an organization, including network security, application security, and data security. They may specialize in a particular type of security, such as cloud security or enterprise security. This course would be helpful for Security Architects by providing them with an understanding of the principles of zero trust architecture and how to implement it in an organization.
IT Security Manager
IT Security Managers oversee the security of an organization's IT systems and data. They may be responsible for developing and implementing security policies, managing security budgets, and responding to security incidents. This course would be helpful for IT Security Managers by providing them with an understanding of the principles of zero trust architecture and how to implement it in an organization.
Cloud Security Analyst
Cloud Security Analysts design and implement cloud security architectures and protect cloud-based assets from unauthorized access. They may specialize in cloud security for a particular industry or organization. This course would be helpful in building a foundation for anyone interested in becoming a Cloud Security Analyst by providing an understanding of the principles of zero trust architecture.
Network Security Engineer
Network Security Engineers design, implement, and manage network security systems, such as firewalls, intrusion detection systems, and virtual private networks (VPNs). They may specialize in a particular type of network security, such as cloud security or enterprise security. This course would be helpful for Network Security Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a network.
Privacy Analyst
Privacy Analysts ensure that organizations protect the privacy of their customers and employees. They may develop and implement privacy policies, conduct privacy impact assessments, and respond to data breaches. This course would be helpful for Privacy Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to protect privacy.
Incident Responder
Incident Responders respond to security incidents. They may be responsible for investigating incidents, containing damage, and restoring systems. This course would be helpful for Incident Responders by providing them with an understanding of the principles of zero trust architecture and how to use it to respond to security incidents.
Compliance Analyst
Compliance Analysts ensure that organizations comply with laws and regulations. They may review policies and procedures, conduct audits, and develop compliance training programs. This course would be helpful for Compliance Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to ensure compliance with laws and regulations.
Penetration Tester
Penetration Testers assess the security of computer systems, networks, and applications by simulating attacks. They identify vulnerabilities and report their findings to organizations so that they can be fixed. This course would be helpful for Penetration Testers by providing them with an understanding of the principles of zero trust architecture and how to use it to assess the security of systems.
Data Scientist
Data Scientists use data to solve business problems. They may be responsible for collecting, cleaning, and analyzing data to identify trends and patterns. This course would be helpful for Data Scientists by providing them with an understanding of the principles of zero trust architecture and how to use it to protect data from unauthorized access.
Security Auditor
Security Auditors assess the security of organizations' IT systems and data. They may review security policies, perform security assessments, and recommend improvements. This course would be helpful for Security Auditors by providing them with an understanding of the principles of zero trust architecture and how to use it to assess the security of systems.
Business Analyst
Business Analysts identify and solve business problems. They may work with stakeholders to gather requirements, analyze data, and develop solutions. This course would be helpful for Business Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to protect business data and systems from unauthorized access.
Risk Analyst
Risk Analysts identify and assess risks to organizations. They may work with stakeholders to develop and implement risk management plans. This course would be helpful for Risk Analysts by providing them with an understanding of the principles of zero trust architecture and how to use it to identify and mitigate risks to organizations.
DevOps Engineer
DevOps Engineers work with developers and operations teams to ensure that software is delivered quickly and securely. They may be responsible for building and maintaining the infrastructure that supports software development and deployment. This course would be helpful for DevOps Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a DevOps environment.
Cloud Engineer
Cloud Engineers design, build, and manage cloud computing systems. They may be responsible for migrating applications to the cloud, managing cloud infrastructure, and developing cloud-based solutions. This course would be helpful for Cloud Engineers by providing them with an understanding of the principles of zero trust architecture and how to implement it in a cloud environment.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Zero Trust Architecture (ZTA): Strategize and Establish.
Provides a practical guide to implementing and managing a zero trust architecture. It covers the key steps involved in implementing a zero trust architecture, as well as the challenges that you may encounter.
Provides a business-oriented perspective on zero trust security. It covers the benefits of zero trust security, as well as the challenges of implementing a zero trust architecture.
Provides a technical deep dive into the zero trust model. It covers the principles of zero trust, as well as the specific technologies and practices that can be used to implement a zero trust architecture.
Offers a comprehensive yet accessible overview of cloud security, touching on some topics that are only directly relevant to Zero Trust in limited cases.
Provides a practical guide to implementing a zero trust security architecture. It covers the key steps involved in implementing a zero trust security architecture, as well as the challenges that you may encounter.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Zero Trust Architecture (ZTA): Strategize and Establish.
Zero Trust Architecture (ZTA): Use Case Identification...
Most relevant
Introduction to Zero Trust
Most relevant
Zero Trust Architecture: Executive Briefing
Most relevant
Managing SUSE Linux Enterprise
Most relevant
Zero Trust Networking (ZTN): The Big Picture
Most relevant
Enterprise Perimeter and Network Security
Most relevant
IT Security Champion: Zero Trust
Most relevant
Microsoft 365 Security, Compliance, and Identity Concepts
Most relevant
Lateral Movement with Infection Monkey
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser