Zero trust policyHere we will discuss types of policy with an example of a zero trust policy versus a legacy policy.
Course descriptionStarting from no trust (zero trust!) and needing to extend some trust (the least possible!) in order for business to occur requires a component of the zero trust architecture to actually decide what to trust and what not to trust. And although the ZTA will ultimately make trust decisions itself at runtime, the zero trust architecture still requires some upfront configuration and guard rails of what types of connections to trust. This will vary by business environment, so we will concentrate on how to express that configuration in policy in this course.
Zero trust policy problems
Video - 00:07:00
How does a zero trust architecture change how you deploy policy across your enterprise? A discussion of strategic and tactical policy.
ZTA access sequence
Video - 00:09:00
Exploring zero trust architecture.
Zero trust policy
Video - 00:19:00
Exploring zero trust policies.
Video - 00:03:00
A simple overview of what you will learn in Course 6.
Zero trust course 6 assessment
Assessment - 10 questions
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps