Zero trust policy Course

Here we will discuss types of policy with an example of a zero trust policy versus a legacy policy.

42 minutes

Course description

Starting from no trust (zero trust!) and needing to extend some trust (the least possible!) in order for business to occur requires a component of the zero trust architecture to actually decide what to trust and what not to trust. And although the ZTA will ultimately make trust decisions itself at runtime, the zero trust architecture still requires some upfront configuration and guard rails of what types of connections to trust. This will vary by business environment, so we will concentrate on how to express that configuration in policy in this course.

Syllabus

Zero trust policy problems

Video - 00:07:00

How does a zero trust architecture change how you deploy policy across your enterprise? A discussion of strategic and tactical policy.
ZTA access sequence

Video - 00:09:00

Exploring zero trust architecture.
Zero trust policy

Video - 00:19:00

Exploring zero trust policies.
Overview

Video - 00:03:00

A simple overview of what you will learn in Course 6.
Zero trust course 6 assessment

Assessment - 10 questions

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust