This course is designed to introduce you to Zero Trust Networks.

Course Content

Course Description

In this course we will discuss what defines a Zero Trust Network, the fundamentals required and how we can manage trust on users, devices, applications and network traffic. Prerequisites: It's important that you as the viewer and listener of this lecture series has a basic understanding of perimeter firewalls. You should also have some level of understanding of traditional network security architecture and network zones such as the open Internet, a DMZ, a trusted zone and a privileged zone and some understanding of public key infrastructure. Lastly, some knowledge of virtual private networks will assist in following along during the course