Zero Trust Security Fundamentals for IT Professionals
Language: English | Size:1.45 GB
Genre:eLearning
Files Included :
1 - Welcome to the Course.mp4 (15.9 MB)
MP4
2 - Quick Course Overview.mp4 (32.91 MB)
MP4
3 - Why Learn Cyber Security from Me.mp4 (19.44 MB)
MP4
4 - CourseTaking Interface Tips Tricks.mp4 (33.09 MB)
MP4
5 - Download Course Lecture PDFs and the Udemy Ratings System.mp4 (15.59 MB)
MP4
64 - Additional Recommended Resources.mp4 (37.52 MB)
MP4
65 - Congratulations Next Steps.mp4 (12.16 MB)
MP4
10 - Never Trust Always Verify.mp4 (14.56 MB)
MP4
11 - Zero Trust Enterprise.mp4 (8.51 MB)
MP4
12 - Tenets of Zero Trust.mp4 (21.2 MB)
MP4
13 - Zero Trust Pillars.mp4 (30.65 MB)
MP4
14 - Zero Trust Historical Context.mp4 (15.51 MB)
MP4
15 - A Glimpse into ZTA.mp4 (25.22 MB)
MP4
7 - Section Introduction.mp4 (11.23 MB)
MP4
8 - What is Zero Trust.mp4 (25.23 MB)
MP4
9 - Some Zero Trust Definitions.mp4 (41.41 MB)
MP4
16 - Section Introduction.mp4 (14.76 MB)
MP4
17 - Why Do We Need Zero Trust.mp4 (29.16 MB)
MP4
18 - Perimeter Security Pitfalls.mp4 (30.47 MB)
MP4
19 - Digital Transformation.mp4 (23.72 MB)
MP4
20 - Microsoft Case Study.mp4 (18.28 MB)
MP4
21 - The State of Zero Trust.mp4 (38.54 MB)
MP4
24 - Section Introduction.mp4 (9.8 MB)
MP4
25 - The NIST Zero Trust Architectural ZTA Model.mp4 (78.69 MB)
MP4
26 - Example RealLife ZTA Solutions.mp4 (25.25 MB)
MP4
27 - NIST ZTA Architecture Approaches.mp4 (13.74 MB)
MP4
28 - NIST ZTA Deployment Models.mp4 (28.46 MB)
MP4
29 - Introduction to Trust Algorithms Policies.mp4 (51.63 MB)
MP4
30 - Section Introduction.mp4 (12.77 MB)
MP4
31 - Reviewing the Pillars of Zero Trust.mp4 (6.06 MB)
MP4
32 - Securing the Users Identity Pillar.mp4 (24.96 MB)
MP4
33 - Securing the Devices Pillar.mp4 (18.46 MB)
MP4
34 - Securing the Network Environment PIllar.mp4 (20.74 MB)
MP4
35 - Securing the Applications Workloads Pillar.mp4 (19.36 MB)
MP4
36 - Securing the Data Pillar.mp4 (17.95 MB)
MP4
37 - Foundational Components.mp4 (38.3 MB)
MP4
38 - Bringing It All Together.mp4 (9.39 MB)
MP4
41 - Section Introduction.mp4 (8.99 MB)
MP4
42 - There is No Right Way to Zero Trust.mp4 (26.16 MB)
MP4
43 - Zero Trust Design Principles.mp4 (30.29 MB)
MP4
44 - The FiveStep Zero Trust Design Methodology.mp4 (34.84 MB)
MP4
45 - Forresters Five Steps to Zero Trust.mp4 (31.78 MB)
MP4
46 - Section Introduction.mp4 (13.76 MB)
MP4
47 - Building a Business Case for Zero Trust.mp4 (46.19 MB)
MP4
48 - The Challenge of Change.mp4 (61.15 MB)
MP4
49 - Create a Zero Trust Team.mp4 (27.16 MB)
MP4
50 - Leveraging the Zero Trust Implementation Curve.mp4 (15.65 MB)
MP4
51 - Tips for a Successful Zero Trust Journey.mp4 (19.53 MB)
MP4
52 - Section Introduction.mp4 (13.41 MB)
MP4
53 - VPNLess Implementation.mp4 (27.89 MB)
MP4
54 - EastWest Segmentation.mp4 (21.48 MB)
MP4
55 - Secure Access From Anywhere.mp4 (20.66 MB)
MP4
56 - Conditional Authentication Authorization.mp4 (23.99 MB)
MP4
57 - Microsoft ZTA StepbyStep.mp4 (30.58 MB)
MP4
58 - Exploring Cloudflares Zero Trust Roadmap.mp4 (18.93 MB)
MP4
59 - Section Introduction.mp4 (11.7 MB)
MP4
60 - NSA Zero Trust Maturity Model.mp4 (9.68 MB)
MP4
61 - Microsoft Zero Trust Maturity Model.mp4 (29.02 MB)
MP4
62 - CISA Zero Trust Maturity Model.mp4 (35.14 MB)
MP4
63 - DoD Target Advanced Zero Trust Activities.mp4 (33.14 MB)
MP4