Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Practical Zero Trust Implementation

Posted By: ELK1nG
Practical Zero Trust Implementation

Practical Zero Trust Implementation
Published 5/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.59 GB | Duration: 5h 4m

Learn how to Practically implement Zero Trust Architecture security in cloud and on-prem

What you'll learn

How to practically implement Zero Trust in cloud (Azure,AWS) & On-Premise locally using VMWare & VirtualBox.

How to develop a strategy, roadmap, and plan of action to implement zero trust.

How to conduct a zero trust readiness\maturity assessment prior to implementing zero trust.

A foundational understanding what zero trust is, the zero trust principles and the pillars of zero trust.

Security requirements for establishing a robust Zero Trust architecture.

Security requirements to look for in a Zero-Trust Authentication Solution.

Use cases for zero trust.

How to apply the zero trust adaptation model in the real word.

How to integrate the zero trust architecture in the application development lifecycle.

Introduction to NIST SP 800-207 Zero Trust Architecture

Mapping the pillars of Zero Trust with the NIST SP 800-207 Architecture

Requirements

1-Basic understanding of IT & cybersecurity principles

2-Basic knowledge of network architectures & how they function

3-Willingness to explore and learn new technologies and concepts

Description

Practical Zero Trust Implementation, is a course that is developed to provide you with the hands-on skills required to plan for, and implement one of the fastest growing emerging concepts in security programs. By undertaking this course, you will gain a fundamental to advance understanding of the zero trust pillars and architecture, but most importantly, how to have it implemented in any organization or business. In this course you will be guided by the best practices provided by NIST, Microsoft & Fortigate. This course is not just about theory, but getting you ready for the job market.This course is divided into six (6) segments as follows:SEGMENT#1Establishing a foundational understanding of zero trust:•Why Zero Trust?•Zero Trust Principles•Brief overview of zero trust and its security pillars. Mapping the pillars  of Zero Trust with the NIST SP 800-207 Architecture•The power of zero trust authentication• Requirements You Must Have in a Zero-Trust Authentication Solution•Important considerations and tasks that should be done prior to implementing zero trust?•Use Cases for Zero TrustKnowledge Check QuestionsSEGMENT#2Before implementing zero trust:•Conducting a Zero Trust Readiness assessment•Developing a zero trust strategy•Develop a Roadmap and Plan of Action for Implementing Zero Trust within Azure•Alignment of the Roadmap and Plan of Action with the Case Scenario•Security requirements for establishing a robust Zero Trust architecture•Exploring those service in azure that can be used to achieve the implementation of zero trust in any business or organization.Knowledge Check QuestionsSEGMENT#3Labs-implementing zero trust:.Steps to Zero Trust Implementation•Practically Implementing Zero Trust in Azure•The alignment of the lab with each pillar of the zero trust model\architecture•Exploring ways of testing Zero Trust Implementation•Integrating Zero Trust into Applications during developmentKnowledge Check QuestionsSEGMENT#4Assignment\Project Labs for students•Applying Zero trust in AWS (guided activity)•Implementing zero trust on-prem using VMware/VirtualBox (guided activity)SEGMENT#5•Implementing Zero Trust in the Real World-A business approach-Learn how to apply zero trust when a business needs to:Rapidly modernize its security postureSecure remote and hybrid wordMeet regulatory compliance requirementsIdentify and protect sensitive business dataPrevent or reduce damage from a data breachSEGMENT#6Introduction to all resources used in courseResume Skills to add on your resume\CVEnd of course

Overview

Section 1: Establishing a foundational understanding of zero trust

Lecture 1 1-Course Intro-Practical Zero Trust Implementation

Lecture 2 2-Intro to Case Scenario

Lecture 3 3-Preparing for the Zero Trust Project

Lecture 4 4-Course Content Outline

Lecture 5 5-Segment#1-Establishing a foundational understanding of zero trust

Lecture 6 6-What is meant by Zero Trust-PT1

Lecture 7 6-What is meant by Zero Trust-PT2

Lecture 8 8-Principles of Zero Trust

Lecture 9 9-Mapping Zero Trust pillars with the NIST Architecture

Lecture 10 10-The Power of Zero Trust authentication

Lecture 11 11-Important things to look for in a zero trust solution

Lecture 12 12-Use cases for zero trust

Section 2: Before implementing zero trust

Lecture 13 13-Intro to Segment 2

Lecture 14 14-Conducting a Zero Trust Readiness Assessment PT-1

Lecture 15 15-Conducting a Zero Trust Readiness Assessment PT-2

Lecture 16 16-Developing a zero trust strategy PT1

Lecture 17 17-Developing a zero trust strategy PT2

Lecture 18 18- Developing roadmap and plan of action for zero trust implementation

Lecture 19 19-Alignment of the roadmap & plan of action with the case scenario

Lecture 20 20-Microsoft security requirements for achieving zero trust

Lecture 21 21-Intro to Azure Zero Trust Services

Section 3: Labs-implementing zero trust

Lecture 22 22-Introduction to SEGMENT#3

Lecture 23 23-Disclaimer to Labs

Lecture 24 24-Steps to Zero Trust Implementation

Lecture 25 25-Lab-Azure Zero Trust Implementation-PT1

Lecture 26 26-Lab-Azure Zero Trust Implementation-PT2

Lecture 27 27-Lab-Azure Zero Trust Implementation-PT3

Lecture 28 28-Lab-Azure Zero Trust Implementation-PT4

Lecture 29 29-Lab-Azure Zero Trust Implementation-PT5

Lecture 30 30-Lab-Azure Zero Trust Implementation-PT6

Lecture 31 31-Lab-Azure Zero Trust Implementation-PT7

Lecture 32 32-Lab-Azure Zero Trust Implementation-PT8

Lecture 33 33-Lab-Azure Zero Trust Implementation-PT9

Lecture 34 34-Addressing the challenges associated with zero trust implementation

Lecture 35 35-Powerful Tools for achieving Zero Trust Implementation

Section 4: Assignment\Project Labs for student

Lecture 36 36-Student Labs for implementing zero trust- Guided exercises

Section 5: Implementing Zero Trust in the Real World-A business approach

Lecture 37 37-Intro to Segment 5

Lecture 38 38-Zero Trust Adoption Framework

Lecture 39 39-Zero Trust adoption framework lifecycle

Lecture 40 40-Business cases for the zero trust adoption framework

Lecture 41 41-Zero trust adoption framework requirements for each business case

Lecture 42 42-Applying the ZT adoption cycle to each business case at a high level

Section 6: Final Stage

Lecture 43 43-Course Recap

Lecture 44 44-Skills acquired for your Resume or CV

Lecture 45 45-END OF COURSE

Section 7: Test Your Knowledge

Section 8: Additional content

Lecture 46 Course Resources

This course is developed as a practical guide for any IT/Security Professioanl who is interested in making their systems and applications, more resilent against cyber attacks. This includes but not limited to:,Security leaders-CISOs,Security professionals,Cloud Security professionals,Security Architects