Course Outline

Introduction

  • Zero Trust vs traditional perimeter security

Overview of BeyondCorp Architecture and Design Principles

Understanding Network Segmentation

Implementing a Perimeterless Design

Knowing Users and their Devices

Authenticating and Authorizing Users

Data Encryption

Maintaining Productivity While Improving Security

The User Experience

Troubleshooting

Summary and Conclusion

Requirements

  • An understanding of networking concepts
  • An understanding of enterprise security
  14 Hours
 

Testimonials

Related Courses

CEH - Certified Ethical Hacker

  35 hours

Certified Chief Information Security Officer (CCISO)

  35 hours

EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)

  21 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Microsoft SDL Core

  14 hours

C/C++ Secure Coding

  21 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours