Understanding Zero Trust
With Malcolm Shore
Liked by 1,141 users
Duration: 59m
Skill level: Beginner
Released: 6/3/2021
Course details
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it’s no longer a viable option in today’s world. Workers working remotely, insider threats, and attackers taking advantage of trust between internal systems—these demand a new approach to extending protection to all users and their devices, regardless of their location. In this course, Malcolm Shore shows how to better protect your networks and systems by adopting what’s known as a zero trust approach to access control—removing trust relationships in networks and requiring that trust decisions are made at the time that access is requested. Malcom starts with a brief history of the concept of software trust, before moving onto key facets of the zero trust approach, the reasons for wanting to minimize trust relationships in network architectures, and the tenets and models that have been proposed for zero trust.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
-
Michael Harrington
Michael Harrington
Area Site Security Officer at NGA
-
Benjamim Duraes
Benjamim Duraes
Pre-sales consultant on unified communications at PT Empresas
-
Rowena Bryce
Rowena Bryce
Head of HR Delivery Services at ASB Bank
Contents
What’s included
- Practice while you learn 1 exercise file
- Test your knowledge 3 quizzes
- Learn on the go Access on tablet and phone