Establish the guiding principles and core components of Zero Trust
- Offered byMicrosoft
Establish the guiding principles and core components of Zero Trust at Microsoft Overview
Duration | 1 hour |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Establish the guiding principles and core components of Zero Trust at Microsoft Course details
- Introduction to Zero Trust
- Describe identities in Zero Trust
- Secure endpoints with Zero Trust
- Describe application access in Zero Trust
- Manage networks with Zero Trust
- Protect infrastructure with Zero Trust
- Protect data with Zero Trust
- Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack
- Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data
- Learn how to use Zero Trust to secure your applications and to protect your organization and its users
- Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date
Establish the guiding principles and core components of Zero Trust at Microsoft Curriculum
Introduction to Zero Trust
Introduction
The Zero Trust security model
Zero Trust as a security strategy
Zero Trust components
Knowledge check
Summary
Describe identities in Zero Trust
Introduction
Identities in Zero Trust
Identity and access management
Knowledge check
Summary
Secure endpoints with Zero Trust
Introduction
What are endpoints?
Protect endpoints
Knowledge check
Summary
Describe application access in Zero Trust
Introduction
Describe cloud applications
Protect cloud applications using Zero Trust
Knowledge check
Summary
Manage networks with Zero Trust
Introduction
What are networks?
Common network attacks
Zero Trust and the network
Protecting your network with Zero Trust
Knowledge check
Summary
Protect infrastructure with Zero Trust
Introduction
What is infrastructure?
Assess and monitor your infrastructure with a Zero Trust framework
Harden your infrastructure
Knowledge check
Summary
Protect data with Zero Trust
Introduction
Know your data
Protect your data and prevent data loss
Knowledge check
Summary