Tags
Language
Tags
February 2025
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 1
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Zero Trust Security

Posted By: ELK1nG
Zero Trust Security

Zero Trust Security
Published 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 547.82 MB | Duration: 2h 43m

Zero Trust Architectures | NIST 800-207 | Zero Trust with Microsoft Security

What you'll learn

Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cybersecurity.

Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.

Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.

Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.

Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations.

Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust.

Microsoft Zero Trust Assessments: Evaluate your organization’s Zero Trust readiness using Microsoft’s assessment tools and recommendations.

Requirements

Willingness to learn cool stuff!

Basic IT Knowledge

Description

Zero Trust Security by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master Zero Trust Security. This course systematically guides you from the basics to advanced concepts of Microsoft Purview.By mastering Zero Trust Security, you're developing expertise in essential topics in today's cybersecurity landscape.Key Benefits for you:1. Zero Trust Fundamentals: Understand the core principles of Zero Trust Security and why it is essential for modern cyber security.2. Components of a ZTA: Explore the critical building blocks of a Zero Trust Architecture, including identity, device, and network security.3. Threats to ZTA: Identify and mitigate common threats that challenge the integrity of a Zero Trust Architecture.4. Establishing a ZTA: Learn step-by-step strategies to implement a robust Zero Trust Architecture within your organization.5. Zero Trust with Microsoft Security: Discover how Microsoft Security solutions support and enhance Zero Trust implementations and how Microsoft Zero Trust architecture can be developed.6. Case Study - A Zero Trust Network Architecture: Analyze a real-world case study to understand the practical application and benefits of Zero Trust Security.7. Microsoft Conditional Access: Learn how to leverage and implement Microsoft Conditional Acccess for your Zero Trust Architectures.

Overview

Section 1: Introduction

Lecture 1 Slides

Lecture 2 FAQs

Section 2: Zero Trust Fundamentals

Lecture 3 What is Zero Trust?

Lecture 4 NIST 800-207: A Zero Trust Architecture

Lecture 5 The 7 Tenets of Zero Trust

Lecture 6 A Zero Trust view of a Network

Section 3: Components of a Zero Trust Architecture (ZTA)

Lecture 7 Logical Components of ZTA

Lecture 8 Device Agent / Gateway-Based Deployment

Lecture 9 Enclave-Based Deployment

Lecture 10 Resource Portal-Based Deployment

Lecture 11 Device Application Sandboxing

Lecture 12 Trust Algorithm

Lecture 13 ZTA with Identity Governance

Lecture 14 ZTA with Micro Segmentation

Lecture 15 ZTA using Network Security

Section 4: Threats to ZTA

Lecture 16 Subversion of ZTA decision process

Lecture 17 Denial of service or network disruption

Lecture 18 Stolen credentials & insider threat

Section 5: Establishing a ZTA

Lecture 19 Pure vs. Hybrid ZTA

Lecture 20 How to estabish a ZTA in a traditional perimeter-based network

Section 6: Zero Trust with Microsoft Security

Lecture 21 Microsoft Zero Trust Principles

Lecture 22 Microsoft Zero Trust Capability Mapping

Section 7: Case Study - Transforming a Flat Network to a ZTA

Lecture 23 Transforming a Flat Network to a ZTA

Section 8: Zero Trust with Conditional Access

Lecture 24 Zero Trust with Conditional Access

Lecture 25 Azure Global Backbone

Lecture 26 Shared Responsibility Model

Lecture 27 Azure Resource Hierarchy

Lecture 28 Azure Subscription Types

Lecture 29 Entra ID Tenants and Azure Subscriptions

Lecture 30 Demo: Get your Azure Subscription

Lecture 31 Conditional Access

Lecture 32 Demo: Conditional Access

Section 9: Bonus

Lecture 33 Bonus

SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler