3.9 Pop Quiz and Summary - ZN
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
so a quick pop quiz here. This is just gonna help us to reflect on what we talked about. What you listen to
00:07
in this course,
00:09
first we have when was zero trust model conceived and we touched on this very early in the course. And I do have supplemental material that will help you go deeper and to learn about the genesis of zero trust model
00:25
a second we have who created a zero trust model. We also touched on this briefly, and additional information will be provided to ah, understand the whereabouts of the person who created the are coined these your trust model name.
00:40
The third we have can be zero trust model be implemented for both on premise and cloud based solutions. We also touched on this when I spoke about the integration of one particular product. And again, supplemental material will be provided for your deeper dive and personal interest.
00:59
So we'll take a look at the answers now
01:04
and number one when was zero trust model conceived on? I was in 2010. So Google gets hacked by China around 2009 and makes their announcement about it in 2010 when they decide they decide to re vent their network
01:22
and they start working on something called Beyond core.
01:26
And we first hear the term is your trust networks in 2010.
01:30
Now who created the zero? Trust the model, right? Some may say it's Google and others may say, As I have said on the slide John kind of AK. He's the one that really coined that term, and
01:45
he is. Someone
01:47
as of this recording is a field CTO for Palo Alto Networks and a vice president and principal analyst for forced to research.
01:57
And we have for our last pop quiz question. Can the zero trust model be implemented for both on premise
02:05
and cloud based solutions? The answer is yes. Zero trust can be applied to Cloud, as we learned. Their threat model is the Internet's threat model, and also Z scaler is a software as a service solution product, and they provide well filled, Web filtering remote access solution
02:24
and that can displace traditional VP ends and other
02:28
offerings that you can check out today.
02:30
Then we saw in the Z scale a diagram, their ability to broker connections to cloud solutions like Amazon Web service is and Microsoft Azure.
02:43
So we touched on a couple of things, and they included define and zero trust networks and the fundamentals that make up the model.
02:51
And we started by defining zero trust and really understanding what it is and what it isn't.
02:57
We looked at the fundamentals that make up the zero trust model, and we learned a little bit about ze scaler, and how they used is your trust concept to replace traditional virtual private networks.
03:08
So then we moved on and talked about what we should trust in a zero trust network
03:15
through trust management, strong authentication and public key infrastructure.
03:23
Now let's think it over.
03:24
I hope this lecture piqued your interest and that you continue to dive into what makes your trust networks appealing.
03:31
You know, Maura organizations will start to bring in technologies that have some sort of tagline promoting zero trust, and it's important that we understand the benefits and that we understand the work that is required to make it a success in our environment.
03:49
You know, with that being said, here are those extra supplemental materials that I think will help you continue the conversation About zero trust
04:00
Now, whether or not you got a perfect score on the quiz, you know I want you to provide. I wanted to provide you with supplemental material to help you go deeper into AA zero trust networks model. The first link pertains to a book that is an easy read and explains a lot about what I discuss with you during this course.
04:20
The second link provides information about Google's beyond court beyond Cores, Google's security model that builds on the idea of zero trust.
04:30
The next link is a Security Roundtable interview with
04:33
the father of zero Trust John Kinder bag, you know here from the Creator himself as he discusses why this model should be widely adopted.
04:43
And then we have the scale of private access, which is, Ah, great option for replacing traditional VPN and something that I think you should check out and maybe even perform a proof of concept in your environment to experience it for yourself.
04:59
And then we have F w not, um, it's a single packet off any case in solution that will give you a deeper understanding of trust in traffic, and it's open source so you could check that out today, Maybe even build out in your own lab.
05:12
And then, of course, the Internet threat model.
05:15
It's, ah, long read, but I thought it was important to include this here. As your trust models use this model and it'll give you a deeper appreciation for, um why the scope of what zero trust is able to do in terms of using
05:32
different technologies that are probably already in your
05:34
security stacking network stock
05:36
to really Ah, never trusting. Always verify.
05:41
I want to say thank you to everyone that listen to this lecture. And I hope you gain some understanding of what defines a zero trust network and the fundamentals that make up the network.
05:51
So until next time, this is Morio Bardwell and this is your trust networks. The fundamentals. Thank you.
Instructed By
Similar Content