Course Outline
Introduction
- Zero Trust vs traditional perimeter security
Overview of BeyondCorp Architecture and Design Principles
Understanding Network Segmentation
Implementing a Perimeterless Design
Knowing Users and their Devices
Authenticating and Authorizing Users
Data Encryption
Maintaining Productivity While Improving Security
The User Experience
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking concepts
- An understanding of enterprise security
Testimonials
Trainer, knowledge of trainer and ability to communicate complicated content and make it understandable.
- Capita Business Services Ltd
The content, very interesting.
Lowri Jones - Capita Business Services Ltd
Friendly informative and met objectives.
- Capita Business Services Ltd
Trainer was very engaging.
Ryan Goddard - Capita Business Services Ltd
For a very intense course, Richard gave a good high level overview for people who work in an IT Department but not actually undertaking the IT aspects of a job e.g. Cloud solutions, platforming, architecture...
- Capita Business Services Ltd
Richard was very knowledgable, clearly knew the subject area extremely well. Broke all of the complicated parts down into easier to understand chunks, and had great rapport with the group. He made a potentially tough and dry subject interesting. As a complete novice, I really enjoyed and found it very helpful for my role.
- Capita Business Services Ltd
It gave me a clear and in depth understanding of NAS and SAN storage
Joubert Choshi - Netcampus
The Lab and Practical side .
Nkosana Tsware - Netcampus
The Lab and Practical side .
Nkosana Tsware - Netcampus
The labs are more interesting as we get to run, create and learn the different commands.