Fundamentals of a Zero Trust Architecture Training

Course 1218

  • Duration: 1 day
  • Language: English
  • Level: Intermediate

Zero trust architecture is a new security paradigm focused on eliminating implicit trust in IT environments. This Zero Trust Architecture training course provides a comprehensive introduction to zero trust concepts, principles, and deployment models. By the end of the course, participants will have the knowledge to assess zero trust readiness, create adoption roadmaps, and design pilot programs aligned with business risk priorities.

Zero Trust Architecture Training Delivery Methods

  • Online

Zero Trust Architecture Training Information

Course Benefits:

  • Understand the limitations of traditional network security and the rationale for zero trust
  • Learn the core concepts and guiding tenets of zero trust architecture
  • Explore zero trust reference models like NIST 800-207
  • Discuss key technologies like micro-segmentation, software-defined perimeters, multi-factor authentication, and continuous authorization
  • Examine zero trust use cases for applications, data, infrastructure, and people
  • Learn deployment, adoption, and maintenance best practices for zero trust

Training Prerequisites

A basic understanding of enterprise security concepts, network infrastructure, authentication, and access controls is recommended.

Zero Trust Architecture Training Outline

  • Fundamentals of a Zero Trust Architecture
  • Zero Trust Definition
  • Why Is Zero Trust Needed?
  • Zero Trust Protections Include...
  • Zero Trust Architecture Design Principles
  • Discover Users, Devices, Data, and Applications
  • Cloud Asset API
  • Identities for Users, Services, and Devices
  • Sample AWS IAM Dashboard
  • IAM Access Management User, Groups, and Roles
  • Identity Life Cycle
  • Identity and Access Management (IAM)
  • Multi-Factor Authentication
  • User and Service Accounts
  • Service Accounts
  • Google GCP Roles and Permissions Demo
  • Device Identity
  • Windows Device Security
  • Security Processor
  • Verified Access
  • DoD Zero Trust Strategy
  • DoD Zero Trust Capabilities Execution Enablers
  • CISA Zero Trust Maturity Model (ZTMM)
  • Zero Trust Maturity Journey
  • Zero Trust Maturity Evolution
  • IAM Policies
  • GCP IAM Permissions
  • AWS IAM Groups, Users, and Roles
  • Verified Access
  • Shielded VMs
  • Measured Boot and Integrity Monitoring
  • Shielded VM Demo
  • AWS UEFI Secure Boot
  • Monitoring Strategy
  • BYOD and Guest Devices
  • Controlling BYOD and Guest Devices
  • Rogue Device Detection
  • Monitoring Web Server Logs
  • Monitoring Web Server Logs Patch Management
  • Network Monitoring
  • Network Monitoring SIEM Dashboard
  • Amazon CloudWatch
  • Monitoring User and Entity Behaviors to Identify Threats
  • Ways to Determine Device and Service Health—Windows
  • Ways to Determine Device and Service Health—Linux
  • Ways to Determine Service Health—Cloud Providers
  • Ways to Determine Service Health—Kubernetes

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Zero Trust Architecture Training FAQs

No prior zero trust knowledge is assumed. A basic understanding of enterprise security concepts, network infrastructure, authentication, and access controls is recommended.

You will be able to evaluate zero trust readiness, create adoption roadmaps, design pilot programs, and advise on zero trust platforms and integration.

No, this is a vendor-neutral course that provides a technology-agnostic grounding in zero trust concepts and principles. Relevant technologies and platforms are discussed for context.

Yes, the course incorporates concepts from the latest zero trust publications like NIST SP 800-207 and industry best practices.

  • Cybersecurity Leaders
  • Cyber Architects
  • Cyber Engineers
Chat With Us