Video description
5+ Hours of Video Instruction
Gives you a vendor-agnostic approach to secure access and resource protection.
Overview:
Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started? The Zero Trust Framework is a 5-hour video course that answers all these questions and helps you build the skills needed for your Zero Trust journey. You’ll learn how to talk about Zero Trust as well as how to use Zero Trust concepts to improve the security of your organization, regardless of where you are in that journey. Included throughout are real-life use cases, assessment methodologies, and maturity ranking techniques that will help you create a customized Zero Trust journey specific to your line of business.
Topics include network, endpoint, and cloud security concepts. The course starts by providing an overview of key security concepts covering the foundational security knowledge needed. It then examines misconceptions, such as how Zero Trust best practices can’t be achieved by simply acquiring a technology like a firewall, identity management solution, or network access control offering. With a strong focus on revolutionizing your defense strategy using the Zero Trust framework, this is a must for anyone who is responsible for the security of their organization.
Bestselling author, trainer, and cyber practitioner Joseph Muniz uses his expertise to discuss the modern standards of the Zero Trust framework. He demonstrates his methodology by working through NIST, the Open Group, and a generic view of Zero Trust from principles to architecture.
Topics in this course include
- Why Care About Security and Zero Trust
- Security Fundamentals
- Zero Trust Beginning
- Zero Trust Principles
- Open Group Architecture
- NIST 800-207 Architecture
- Generalized Zero Trust Architecture
- Build Your Own Zero Trust Journey
About the Instructor
Joseph Muniz is the director of business development for security solutions at Microsoft and a security researcher. He is driven to make the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architecture as a trusted advisor for the top Fortune 500 corporations and the U.S. government.
Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. He runs thesecurityblogger.com website, a popular resource for security and product implementation. He is the author and contributor of several publications, including titles ranging from security best practices to exploitation tactics. Joseph’s latest titles are The Modern Security Operations Center and CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide. When Joseph is not using technology, you can find him on the futbal field.
Follow Joseph @SecureBlogger.
Skill Level:
Beginner to intermediary
Learn How To:
- Become a better security professional
- Build your own Zero Trust journey
- Understand the true meaning of the Zero Trust security framework
- Determine how to apply security best practices represented in the latest Zero Trust framework to your organization
- Understand how to assess your existing security capabilities and map out a plan for improving your organization’s security practices
- Understand security best practices for all areas of your business (cloud, endpoint, and network)
Course requirement:
Fundamental understanding of network and security concepts
Who Should Take This Course:
- Anyone involved in security architecture and decision-making must have a clear understanding of Zero Trust concepts, which cover job roles in cloud, network, and application security, spanning an entire organization.
- This course benefits those entering security roles as well as existing careers looking to better understand Zero Trust concepts.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Lesson 1: Why Care About Security and Zero Trust
-
Lesson 2: Security Fundamentals
- Learning objectives
- 2.1 Security architecture fundamentals
- 2.2 Cloud aka “as a service” is the future!
- 2.3 Secure access service edge explained
- 2.4 Threat mapping
- 2.5 Security capabilities
- 2.6 Extended Detection and Response (XDR) explained
- 2.7 Securing Network, Clouds, and Workloads
- 2.8 Security Heatmaps
- Lesson 3: Zero Trust Beginning
- Lesson 4: Zero Trust Principles
- Lesson 5: Open Group Architecture
- Lesson 6: NIST 800-207 Architecture
- Lesson 7: Generalized Zero Trust Architecture
- Lesson 8: Build Your Own Zero Trust Journey
- Lesson 9: Next Steps
- Summary
Product information
- Title: The Zero Trust Framework
- Author(s):
- Release date: August 2023
- Publisher(s): Pearson
- ISBN: 0138251827
You might also like
book
Zero Trust Architecture
Today's organizations need a new security model that more effectively adapts to the complexity and risks …
video
Security Superstream: Zero Trust
With the expansion of the remote workforce, more than ever security professionals need to know exactly …
book
Zero Trust Security: An Enterprise Guide
Understand how Zero Trust security can and should integrate into your organization. This book covers the …
book
Project Zero Trust
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy …