Zero Trust Security
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 547.82 MB | Duration: 2h 43m
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 547.82 MB | Duration: 2h 43m
Zero Trust Architectures | NIST 800-207 | Zero Trust with Microsoft Security
What you'll learn
Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cybersecurity.
Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.
Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.
Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.
Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations.
Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust.
Microsoft Zero Trust Assessments: Evaluate your organization’s Zero Trust readiness using Microsoft’s assessment tools and recommendations.
Requirements
Willingness to learn cool stuff!
Basic IT Knowledge
Description
Zero Trust Security by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master Zero Trust Security. This course systematically guides you from the basics to advanced concepts of Microsoft Purview.By mastering Zero Trust Security, you're developing expertise in essential topics in today's cybersecurity landscape.Key Benefits for you:1. Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cyber security.2. Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.3. Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.4. Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.5. Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations and how Microsoft Zero Trust architecture can be developed.6. Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust Security.7. Microsoft Conditional Access: Learn how to leverage and implement Microsoft Conditional Acccess for your Zero Trust Architectures.
Overview
Section 1: Introduction
Lecture 1 Slides
Lecture 2 FAQs
Section 2: Zero Trust Fundamentals
Lecture 3 What is Zero Trust?
Lecture 4 NIST 800-207: A Zero Trust Architecture
Lecture 5 The 7 Tenets of Zero Trust
Lecture 6 A Zero Trust view of a Network
Section 3: Components of a Zero Trust Architecture (ZTA)
Lecture 7 Logical Components of ZTA
Lecture 8 Device Agent / Gateway-Based Deployment
Lecture 9 Enclave-Based Deployment
Lecture 10 Resource Portal-Based Deployment
Lecture 11 Device Application Sandboxing
Lecture 12 Trust Algorithm
Lecture 13 ZTA with Identity Governance
Lecture 14 ZTA with Micro Segmentation
Lecture 15 ZTA using Network Security
Section 4: Threats to ZTA
Lecture 16 Subversion of ZTA decision process
Lecture 17 Denial of service or network disruption
Lecture 18 Stolen credentials & insider threat
Section 5: Establishing a ZTA
Lecture 19 Pure vs. Hybrid ZTA
Lecture 20 How to estabish a ZTA in a traditional perimeter-based network
Section 6: Zero Trust with Microsoft Security
Lecture 21 Microsoft Zero Trust Principles
Lecture 22 Microsoft Zero Trust Capability Mapping
Section 7: Case Study - Transforming a Flat Network to a ZTA
Lecture 23 Transforming a Flat Network to a ZTA
Section 8: Zero Trust with Conditional Access
Lecture 24 Zero Trust with Conditional Access
Lecture 25 Azure Global Backbone
Lecture 26 Shared Responsibility Model
Lecture 27 Azure Resource Hierarchy
Lecture 28 Azure Subscription Types
Lecture 29 Entra ID Tenants and Azure Subscriptions
Lecture 30 Demo: Get your Azure Subscription
Lecture 31 Conditional Access
Lecture 32 Demo: Conditional Access
Section 9: Bonus
Lecture 33 Bonus
SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler