Microsoft
Microsoft Logo

Establish the guiding principles and core components of Zero Trust 

  • Offered byMicrosoft

Establish the guiding principles and core components of Zero Trust
 at 
Microsoft 
Overview

Duration

1 hour

Start from

Start Now

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

Establish the guiding principles and core components of Zero Trust
 at 
Microsoft 
Course details

What are the course deliverables?
  • Introduction to Zero Trust
  • Describe identities in Zero Trust
  • Secure endpoints with Zero Trust
  • Describe application access in Zero Trust
  • Manage networks with Zero Trust
  • Protect infrastructure with Zero Trust
  • Protect data with Zero Trust
More about this course
  • Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack
  • Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data
  • Learn how to use Zero Trust to secure your applications and to protect your organization and its users
  • Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date

Establish the guiding principles and core components of Zero Trust
 at 
Microsoft 
Curriculum

Introduction to Zero Trust

Introduction

The Zero Trust security model

Zero Trust as a security strategy

Zero Trust components

Knowledge check

Summary

Describe identities in Zero Trust

Introduction

Identities in Zero Trust

Identity and access management

Knowledge check

Summary

Secure endpoints with Zero Trust

Introduction

What are endpoints?

Protect endpoints

Knowledge check

Summary

Describe application access in Zero Trust

Introduction

Describe cloud applications

Protect cloud applications using Zero Trust

Knowledge check

Summary

Manage networks with Zero Trust

Introduction

What are networks?

Common network attacks

Zero Trust and the network

Protecting your network with Zero Trust

Knowledge check

Summary

Protect infrastructure with Zero Trust

Introduction

What is infrastructure?

Assess and monitor your infrastructure with a Zero Trust framework

Harden your infrastructure

Knowledge check

Summary

Protect data with Zero Trust

Introduction

Know your data

Protect your data and prevent data loss

Knowledge check

Summary

Establish the guiding principles and core components of Zero Trust
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Establish the guiding principles and core components of Zero Trust
 at 
Microsoft 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Microsoft

    Free
    2 hours
    Intermediate
    Free
    4 hours
    Intermediate
    Free
    5 hours
    Beginner
    Free
    1 hours
    Beginner
    View Other 1171 CoursesRight Arrow Icon
    qna

    Establish the guiding principles and core components of Zero Trust
     at 
    Microsoft 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...