The Zero Trust Framework

Video description

5+ Hours of Video Instruction

Gives you a vendor-agnostic approach to secure access and resource protection.

Overview:

Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started? The Zero Trust Framework is a 5-hour video course that answers all these questions and helps you build the skills needed for your Zero Trust journey. You’ll learn how to talk about Zero Trust as well as how to use Zero Trust concepts to improve the security of your organization, regardless of where you are in that journey. Included throughout are real-life use cases, assessment methodologies, and maturity ranking techniques that will help you create a customized Zero Trust journey specific to your line of business.

Topics include network, endpoint, and cloud security concepts. The course starts by providing an overview of key security concepts covering the foundational security knowledge needed. It then examines misconceptions, such as how Zero Trust best practices can’t be achieved by simply acquiring a technology like a firewall, identity management solution, or network access control offering. With a strong focus on revolutionizing your defense strategy using the Zero Trust framework, this is a must for anyone who is responsible for the security of their organization.

Bestselling author, trainer, and cyber practitioner Joseph Muniz uses his expertise to discuss the modern standards of the Zero Trust framework. He demonstrates his methodology by working through NIST, the Open Group, and a generic view of Zero Trust from principles to architecture.

Topics in this course include

  • Why Care About Security and Zero Trust
  • Security Fundamentals
  • Zero Trust Beginning
  • Zero Trust Principles
  • Open Group Architecture
  • NIST 800-207 Architecture
  • Generalized Zero Trust Architecture
  • Build Your Own Zero Trust Journey

About the Instructor

Joseph Muniz is the director of business development for security solutions at Microsoft and a security researcher. He is driven to make the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architecture as a trusted advisor for the top Fortune 500 corporations and the U.S. government.

Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. He runs thesecurityblogger.com website, a popular resource for security and product implementation. He is the author and contributor of several publications, including titles ranging from security best practices to exploitation tactics. Joseph’s latest titles are The Modern Security Operations Center and CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide. When Joseph is not using technology, you can find him on the futbal field.

Follow Joseph @SecureBlogger.

Skill Level:

Beginner to intermediary

Learn How To:

  • Become a better security professional
  • Build your own Zero Trust journey
  • Understand the true meaning of the Zero Trust security framework
  • Determine how to apply security best practices represented in the latest Zero Trust framework to your organization
  • Understand how to assess your existing security capabilities and map out a plan for improving your organization’s security practices
  • Understand security best practices for all areas of your business (cloud, endpoint, and network)

Course requirement:

Fundamental understanding of network and security concepts

Who Should Take This Course:

  • Anyone involved in security architecture and decision-making must have a clear understanding of Zero Trust concepts, which cover job roles in cloud, network, and application security, spanning an entire organization.
  • This course benefits those entering security roles as well as existing careers looking to better understand Zero Trust concepts.

About Pearson Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. The Zero Trust Framework: Introduction
  2. Lesson 1: Why Care About Security and Zero Trust
    1. Learning objectives
    2. 1.1 My ask and your commitment
    3. 1.2 Understanding how zero trust fits into the security model
    4. 1.3 The cat and mouse game
    5. 1.4 IoT threats
    6. 1.5 Security best practice resources
  3. Lesson 2: Security Fundamentals
    1. Learning objectives
    2. 2.1 Security architecture fundamentals
    3. 2.2 Cloud aka “as a service” is the future!
    4. 2.3 Secure access service edge explained
    5. 2.4 Threat mapping
    6. 2.5 Security capabilities
    7. 2.6 Extended Detection and Response (XDR) explained
    8. 2.7 Securing Network, Clouds, and Workloads
    9. 2.8 Security Heatmaps
  4. Lesson 3: Zero Trust Beginning
    1. Learning objectives
    2. 3.1 Zero trust history
    3. 3.2 Guidelines vs policies
    4. 3.3 Zero trust resources
  5. Lesson 4: Zero Trust Principles
    1. Learning objectives
    2. 4.1 Classic zero trust principles
    3. 4.2 Current zero trust principles
    4. 4.3 Real world principles
  6. Lesson 5: Open Group Architecture
    1. Learning objectives
    2. 5.1 Open group principals
    3. 5.2 Architecture dissection 
    4. 5.3 Capability heat mapping
  7. Lesson 6: NIST 800-207 Architecture
    1. Learning objectives
    2. 6.1 NIST 800-207 principles
    3. 6.2 Architecture dissection
    4. 6.3 Capability heat mapping
  8. Lesson 7: Generalized Zero Trust Architecture
    1. Learning objectives
    2. 7.1 Zero trust principles
    3. 7.2 Planning a zero trust design: business goals
    4. 7.3 Planning a zero trust design: technical goals
    5. 7.4 From flat and unsecure to zero trust
  9. Lesson 8: Build Your Own Zero Trust Journey
    1. Learning objectives
    2. 8.1 Keys to success and failure
    3. 8.2 Executive sponsorship and mission planning
    4. 8.3 Use case 1: ABC Gaming
    5. 8.4 Use case 2: XYZ University
  10. Lesson 9: Next Steps
    1. Learning objectives
    2. 9.1 Course summary
    3. 9.2 Zero trust careers
    4. 9.3 Next steps
  11. Summary
    1. The Zero Trust Framework: Summary

Product information

  • Title: The Zero Trust Framework
  • Author(s): Joseph Muniz
  • Release date: August 2023
  • Publisher(s): Pearson
  • ISBN: 0138251827