Course Outline

Introduction to Zero Trust Architecture

  • Overview of Zero Trust principles and their relevance to modern security models
  • Key differences between traditional and Zero Trust architectures
  • Core concepts: least-privilege, continuous verification, and identity-based access

Designing a Zero Trust Network

  • Segmenting the network for granular access control
  • Designing policies for resource and application protection
  • Design considerations for scalable and secure networks

Identity and Access Management (IAM) in Zero Trust

  • Implementing strong authentication mechanisms (MFA, biometrics)
  • Federation and Single Sign-On (SSO) in Zero Trust
  • Role-based access control (RBAC) and attribute-based access control (ABAC)

Zero Trust Policy Enforcement

  • Enforcing policies at the network, application, and data levels
  • Continuous monitoring and real-time threat detection
  • Automating policy enforcement through security tools

Integrating Zero Trust with Cloud and Hybrid Environments

  • Adapting Zero Trust for cloud-native and hybrid infrastructures
  • Leveraging cloud security tools (AWS IAM, Azure AD) for Zero Trust
  • Designing Zero Trust for multi-cloud environments

Zero Trust Security for Endpoints

  • Securing endpoints through device authentication and posture assessment
  • Implementing endpoint detection and response (EDR) within a Zero Trust framework
  • Managing BYOD (Bring Your Own Device) and IoT devices in a Zero Trust model

Risk Assessment and Mitigation in Zero Trust Architecture

  • Evaluating risks associated with traditional network perimeter security
  • Mitigating insider threats and lateral movement in Zero Trust
  • Best practices for vulnerability management and remediation

Case Studies and Real-World Examples

  • Lessons learned from Zero Trust implementations across industries
  • Analyzing successful and failed Zero Trust strategies

Summary and Next Steps

Requirements

  • In-depth understanding of network security and access control models
  • Experience with firewalls, VPNs, and other network security tools
  • Familiarity with cloud security concepts and platforms

Audience

  • Security architects
  • IT managers
  • System designers
 21 Hours

Delivery Options

Private Group Training

Our identity is rooted in delivering exactly what our clients need.

  • Pre-course call with your trainer
  • Customisation of the learning experience to achieve your goals -
    • Bespoke outlines
    • Practical hands-on exercises containing data / scenarios recognisable to the learners
  • Training scheduled on a date of your choice
  • Delivered online, onsite/classroom or hybrid by experts sharing real world experience

Private Group Prices RRP from €6840 online delivery, based on a group of 2 delegates, €2160 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.

Contact us for an exact quote and to hear our latest promotions


Public Training

Please see our public courses

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories