Course Outline

Introduction

  • Zero Trust vs traditional perimeter security

Overview of BeyondCorp Architecture and Design Principles

Understanding Network Segmentation

Implementing a Perimeterless Design

Knowing Users and their Devices

Authenticating and Authorizing Users

Data Encryption

Maintaining Productivity While Improving Security

The User Experience

Troubleshooting

Summary and Conclusion

Requirements

  • An understanding of networking concepts
  • An understanding of enterprise security
  14 Hours
 

Testimonials (6)

Related Courses

CRISC - Certified in Risk and Information Systems Control

  21 Hours

Cloud Computing Security Knowledge (CCSK) Preparation Course

  21 Hours

Related Categories