Learn Zero Trust Network Access With Openziti Hands On Lab
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.67 GB | Duration: 3h 28m
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.67 GB | Duration: 3h 28m
Master Zero Trust Security with OpenZiti: Hands-on Lab Experience
What you'll learn
Understand the Fundamentals of Zero Trust Security - Learners will gain a solid understanding of the core principles and concepts behind Zero Trust security
Gain Practical Knowledge of Security Tools - Learners will become familiar with the tools and technologies necessary to deploy a Zero Trust architecture
Evaluate and Implement Zero Trust Strategies for Network Access- Learners will be able to design and implement strategies for controlling access to applications
Understand and Implement OpenZiti for Zero Trust Networking - Learners will gain hands-on knowledge of OpenZiti, an open-source Zero Trust networking platform
Learn to Integrate Zero Trust with Cloud and Hybrid Environments - Learners will understand how to apply Zero Trust principles in cloud and hybrid environments
Learners will learn how micro-segmentation and least privilege access principles can help mitigate the risks of lateral movement and unauthorized access.
Requirements
Learn Without Coding or Complex Commands - Learners will be able to grasp all concepts and techniques in the course without needing prior knowledge of coding or technical programming languages. The course is designed to be accessible to individuals from various backgrounds, making it ideal for security professionals, business leaders, and anyone interested in understanding Zero Trust security.
Description
Unlock the power of Zero Trust Network Access (ZTNA) and learn how to implement a modern, secure network architecture using OpenZiti in this comprehensive, hands-on lab course. This course is perfect for IT professionals, network administrators, and cybersecurity enthusiasts seeking to deepen their understanding of Zero Trust principles and how they can be applied in real-world environments.Zero Trust is a security model that assumes no entity, whether inside or outside the network, should be trusted by default. This approach is vital in today’s threat landscape, where traditional perimeter defenses no longer provide adequate protection. With OpenZiti, an open-source, cloud-native platform, you will learn to build secure, scalable, and flexible network access solutions that eliminate the need for traditional VPNs, allowing you to enforce strict, identity-based access policies.This course provides not only the theoretical knowledge behind Zero Trust but also deep, practical insights into how to implement and maintain ZTNA using OpenZiti. You will leave with a hands-on understanding of how to secure modern IT environments against increasingly sophisticated threats and how to ensure your organization’s data, resources, and applications are protected at all times.By the end of the course, you will be proficient in applying Zero Trust security principles using OpenZiti and will have the skills to enhance network security, simplify access management, and reduce the risks associated with unauthorized access. Whether you're looking to implement a zero-trust strategy for your organization or advance your cybersecurity expertise, this course will equip you with the tools and knowledge to succeed
Overview
Section 1: Module 1 - Introduction
Lecture 1 Introduction
Lecture 2 Agenda
Section 2: Module 2 - ZTNA Core Principles
Lecture 3 ZTNA Intro
Lecture 4 Continues Verification
Lecture 5 Least Privilige
Lecture 6 Network Segmentation & Assume Breach
Lecture 7 Identity and Access Management & Encryption
Section 3: Module 3 - VPN Introduction
Lecture 8 VPNs
Lecture 9 VPN Challenges
Section 4: Module 4 - OpenZiti Concepts
Lecture 10 OpenZiti and its Benefits
Lecture 11 OpenZiti Core Concepts
Section 5: Module 5 - Hands on Lab
Lecture 12 Architecture Diagram
Lecture 13 Note
Lecture 14 Download Resources
Lecture 15 Deploy Ubuntu Desktop
Lecture 16 Deploy Ubuntu Server
Lecture 17 Deploy Azure Central US
Lecture 18 Deploy Azure Central India
Lecture 19 Install Ziti Client
Lecture 20 Set Static IP
Lecture 21 Install Controller and ZAC
Lecture 22 Deploy Edge Routers
Lecture 23 ZAC Overview
Lecture 24 Create Service for Scenario 1
Lecture 25 Create Policy and Validate Access for Scenario 1
Lecture 26 Additional Features
Lecture 27 Create and Validate Scenario 2
Lecture 28 Create and Validate Scenario 3
Section 6: Module 6 - Deep Dive
Lecture 29 Deep Dive into OpenZiti
Lecture 30 Validate Smart Routing
Lecture 31 Thank You
IT Security Professionals – Those responsible for securing networks, applications, and infrastructure who want to learn how to transition to or strengthen a Zero Trust security model.,Network Engineers and Administrators – Professionals who manage enterprise networks and seek to adopt Zero Trust principles to enhance access control and reduce vulnerabilities in network configurations.,Cloud Security Specialists – Individuals working with cloud environments who need to ensure secure and trusted access across distributed, multi-cloud infrastructures.,Students and Aspiring Cybersecurity Professionals – Individuals interested in entering the field of cybersecurity who want to gain a foundational understanding of Zero Trust and its practical applications in securing modern IT environments.