1.1 Introduction - ZN
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello and welcome to the video lecture course. Zero Trust networks. The fundamentals.
00:07
My name is Mario Bardwell and I will be your instructor during this course.
00:11
The reason for giving this lecture is to continue the conversation about how the network perimeter is everywhere and the physical perimeter is vanishing,
00:21
and organizations want their employees to be more productive. And that means working from anywhere, at any time on any device, all while reducing their risk of being compromised.
00:33
So how do we actually do that? How do we get to a place where we have infrastructure and the visibility to make all of that happen?
00:41
Well, back in 2010 Google stated that in their block post that they were attacked by China.
00:48
Google claims that Operation Aurora was highly sophisticated and a coordinated hack attack against its corporate network.
00:57
Google claims hackers had stolen their intellectual property.
01:00
Now this led to Google's beyond core project that Google states set out to shift access controls from the network perimeter
01:08
to individual devices and users.
01:11
Google Core allows employees toe work more securely from any location without the need for traditional VPN.
01:19
Shortly after this project, again,
01:23
the turn zero trust networks was coined,
01:26
so stay tuned.
01:27
And as a very popular political newscaster would say, Watch this space
01:37
now a little bit about my background.
01:38
I've had the privilege to work in information technology for 10 years in various roles
01:45
and industries such as law, education, government service is and construction now. Currently, I'm an information security engineer responsible for securing remote access, managing endpoint network and Web application vulnerabilities.
02:01
Next generation anti virus operations,
02:05
email security policies and assist in an internal investigations is also a part of my job.
02:10
I hold a massive degree in cyber security and information assurance
02:15
and also an undergraduate degree in network communications and management.
02:22
I also hold various sort of a casing, such as the CIA's SP SSC, PCH, Lennox plus and a fume, or during my 10 years in information technology that are mostly geared towards information security.
02:38
So what's this course about? This course is designed to introduce you to zero trust networks. Zero trust model
02:46
came about in 2010 and the original idea was created by John Kinder Bag.
02:53
And just like many great ideas and inventions, Johnson model was birth due to problems we face
03:00
trying to evolve that agent network security posture. So the way we secure networks must change due to the way our workforce has changed the way they work
03:12
now. Equally as important, however, for change in our methodology is brought about by the way our adversaries deploy sophisticated malware that we know Concert Convent, the traditional castle in mode approach we have with contemporary network security architectures.
03:29
So in this course I will discuss the key components that make up a zero trust network and the importance of why you should care about this model,
03:39
my target audience. But this course our network administrators, security engineers who have around three years of experience in their respective feels
03:51
I t managers, chief technology officers and and really anyone that has an interest in how the zero trust paradigm shift creates new opportunities in our industry.
04:03
It's important that you, as a viewer and listener of this lecture series, has a basic understanding of perimeter firewalls.
04:13
You should also have some level of understanding of traditional network security architecture and network zones such as the open Internet,
04:21
A D M Z trusted zone and a purple IT zone,
04:26
and some understanding of public key infrastructure.
04:29
Lastly, some knowledge of virtual private networks of BP ends no. So with all that in your background, with all that understanding, you have no problem following along during the duration of this course
04:46
to put a fine point on it.
04:47
What you learn in this lecture
04:50
is what defines a zero trust network,
04:54
also, what makes up the fundamentals
04:56
with a zero trust model and what needs to be trusted
05:00
in the C zero trust network.
05:04
So just a quick recap of the short introduction section, I introduced myself and provided my background in the area of security.
05:13
The topic of zero trust networks for this course was also introduced to you,
05:17
and I explained to you as a viewer and or listener
05:21
who my target audience will be and share the learning objectives for the course.
05:28
And those learning objectives are to flying in a zero trust network,
05:31
understanding the fundamentals off zero trust model and figuring out what needs to be trusted in this model.
05:40
So in the next section we will discuss what defines zero trust networks,
05:45
what they are and what they are not
05:47
more ahead. Stay with us
Up Next
Instructed By
Similar Content