Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Zero Trust Security

    Posted By: ELK1nG
    Zero Trust Security

    Zero Trust Security
    Published 2/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 547.82 MB | Duration: 2h 43m

    Zero Trust Architectures | NIST 800-207 | Zero Trust with Microsoft Security

    What you'll learn

    Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cybersecurity.

    Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.

    Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.

    Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.

    Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations.

    Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust.

    Microsoft Zero Trust Assessments: Evaluate your organization’s Zero Trust readiness using Microsoft’s assessment tools and recommendations.

    Requirements

    Willingness to learn cool stuff!

    Basic IT Knowledge

    Description

    Zero Trust Security by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master Zero Trust Security. This course systematically guides you from the basics to advanced concepts of Microsoft Purview.By mastering Zero Trust Security, you're developing expertise in essential topics in today's cybersecurity landscape.Key Benefits for you:1. Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cyber security.2. Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.3. Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.4. Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.5. Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations and how Microsoft Zero Trust architecture can be developed.6. Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust Security.7. Microsoft Conditional Access: Learn how to leverage and implement Microsoft Conditional Acccess for your Zero Trust Architectures.

    Overview

    Section 1: Introduction

    Lecture 1 Slides

    Lecture 2 FAQs

    Section 2: Zero Trust Fundamentals

    Lecture 3 What is Zero Trust?

    Lecture 4 NIST 800-207: A Zero Trust Architecture

    Lecture 5 The 7 Tenets of Zero Trust

    Lecture 6 A Zero Trust view of a Network

    Section 3: Components of a Zero Trust Architecture (ZTA)

    Lecture 7 Logical Components of ZTA

    Lecture 8 Device Agent / Gateway-Based Deployment

    Lecture 9 Enclave-Based Deployment

    Lecture 10 Resource Portal-Based Deployment

    Lecture 11 Device Application Sandboxing

    Lecture 12 Trust Algorithm

    Lecture 13 ZTA with Identity Governance

    Lecture 14 ZTA with Micro Segmentation

    Lecture 15 ZTA using Network Security

    Section 4: Threats to ZTA

    Lecture 16 Subversion of ZTA decision process

    Lecture 17 Denial of service or network disruption

    Lecture 18 Stolen credentials & insider threat

    Section 5: Establishing a ZTA

    Lecture 19 Pure vs. Hybrid ZTA

    Lecture 20 How to estabish a ZTA in a traditional perimeter-based network

    Section 6: Zero Trust with Microsoft Security

    Lecture 21 Microsoft Zero Trust Principles

    Lecture 22 Microsoft Zero Trust Capability Mapping

    Section 7: Case Study - Transforming a Flat Network to a ZTA

    Lecture 23 Transforming a Flat Network to a ZTA

    Section 8: Zero Trust with Conditional Access

    Lecture 24 Zero Trust with Conditional Access

    Lecture 25 Azure Global Backbone

    Lecture 26 Shared Responsibility Model

    Lecture 27 Azure Resource Hierarchy

    Lecture 28 Azure Subscription Types

    Lecture 29 Entra ID Tenants and Azure Subscriptions

    Lecture 30 Demo: Get your Azure Subscription

    Lecture 31 Conditional Access

    Lecture 32 Demo: Conditional Access

    Section 9: Bonus

    Lecture 33 Bonus

    SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler