Zero Trust Architecture (ZTA): Strategize and Establish
This course will teach you the steps involved in establishing a zero trust architecture.
Did you know that a properly architected zero trust network removes the need for remote users to utilize corporate VPN? Zero trust architecture should be viewed as a maturing journey rather than a destination. In this course, Establishing a Zero Trust Architecture (ZTA), you’ll learn the steps you need to take on your journey. First, you’ll explore the basics of the five steps to ZTA. Next, you’ll discover identifying the business protect surface and how to capture the transaction flows. Finally, you’ll explore architecting a zero trust network, create a zero trust policy, and how to monitor and maintain your ZTA. When you’re finished with this course, you’ll have the skills and knowledge of Establishing a Zero Trust Architecture (ZTA) needed to establish your zero trust architecture.
Author Name: Dr. Lyron H. Andrews
Author Description:
Dr. Andrews’ technology career spans three decades. His roles included network manager New York City Department of Education, BMG Direct senior director of IT, and BNY Mellon dean of technology. His doctoral research at Teachers College Columbia found that critical thinking skills thrive in environments that are supportive of five essential elements in the mind of a critical thinker. He teaches cyber security. He has integrated technology management with teaching at Columbia University and other… more
There are no reviews yet.