Course Overview

The Zero Trust model relies on contextual awareness to adaptively grant access to authorized users using patterns based on identity, time, and device posture. It tightens the reins on access security while giving your users their choice of devices and apps. Zero Trust stretches across Information Technology (IT) functions, including security, networking, applications, and data, to finance, HR, and C-suite executives because sensitive data must be identified, mapped, and safeguarded. 

The course begins with the evolution of the network and security. As you move on, you will learn to create network and security architecture. Further, you will understand how zero-trust networking works. Additionally, you will discover some of the components used to create a new network and security model and a good understanding of how Zero Trust Networking works. In addition, you will learn the two main Zero Trust Networking concepts, micro-segmentation, and software-defined perimeter. 

By the end of the course, you will become an expert and gain the ability to evolve your network to match the new digital world and combat the bad actors both internal and external to your network. 

What You Will Learn

  • The key pillars of what makes up the Zero Trust model
  • and how that differs from a traditional perimeter-based model.
  • The importance of understanding threats to the Enterprise and how Zero Trust mitigates threats and risks to the Enterprise.
  • Solutions and capabilities that make up a Zero Trust security posture.
  • The practical steps necessary to protect your network and applications by implementing a Zero Trust architecture.
  • Once you have moved to a Zero Trust architecture
  • how to respond to and mitigate threats.

Program Curriculum

  • General Terms and Definitions
  • Risk Management
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Threat Actors and Their Motivations
  • The Impact of a Breach
  • Chapter 2 Quiz

  • What is Application Security?
  • Web Application Exploits
  • Secure Development Practices
  • The Web Application Firewall
  • Web Application Firewall Demonstration
  • Chapter 3 Quiz

  • Introduction to Identity Management
  • Identity Management Principles
  • Identity Management and Zero Trust
  • Chapter 4 Quiz

  • Introduction to Micro-segmentation
  • How to Approach Micro-segmentation?
  • Chapter 5 Quiz

  • Application Access Solutions
  • Chapter 6 Quiz

  • Threat Protection Solutions
  • Chapter 7 Quiz

  • Introduction to Incident Management
  • Incident Management Framework
  • Incident Management and Zero Trust
  • Chapter 8 Quiz

  • Key Takeaways
  • Wrap up and Thank You!
Load more modules

Instructor

Mark Schimmelbusch

Mark Schimmelbusch has been a security consultant for large Enterprise customers for the past 8 years and has been working in various security roles for the past 18 years. His experience has been in working with large Financial Services and Public Sector clients, such as the Department of Defense. He has certifications from the Project Management Institute and the International Information System Security Certification Consortium.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8