Cargando…

The zero trust framework.

5+ Hours of Video Instruction Gives you a vendor-agnostic approach to secure access and resource protection. Overview: Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Descripción
Sumario:5+ Hours of Video Instruction Gives you a vendor-agnostic approach to secure access and resource protection. Overview: Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started? The Zero Trust Framework is a 5-hour video course that answers all these questions and helps you build the skills needed for your Zero Trust journey. You'll learn how to talk about Zero Trust as well as how to use Zero Trust concepts to improve the security of your organization, regardless of where you are in that journey. Included throughout are real-life use cases, assessment methodologies, and maturity ranking techniques that will help you create a customized Zero Trust journey specific to your line of business. Topics include network, endpoint, and cloud security concepts. The course starts by providing an overview of key security concepts covering the foundational security knowledge needed. It then examines misconceptions, such as how Zero Trust best practices can't be achieved by simply acquiring a technology like a firewall, identity management solution, or network access control offering. With a strong focus on revolutionizing your defense strategy using the Zero Trust framework, this is a must for anyone who is responsible for the security of their organization. Bestselling author, trainer, and cyber practitioner Joseph Muniz uses his expertise to discuss the modern standards of the Zero Trust framework. He demonstrates his methodology by working through NIST, the Open Group, and a generic view of Zero Trust from principles to architecture. Topics in this course include Why Care About Security and Zero Trust Security Fundamentals Zero Trust Beginning Zero Trust Principles Open Group Architecture NIST 800-207 Architecture Generalized Zero Trust Architecture Build Your Own Zero Trust Journey About the Instructor Joseph Muniz is the director of business development for security solutions at Microsoft and a security researcher. He is driven to make the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architecture as a trusted advisor for the top Fortune 500 corporations and the U.S. government. Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. He runs thesecurityblogger.com website, a popular resource for security and product implementation. He is the author and contributor of several publications, including titles ranging from security best practices to exploitation tactics. Joseph's latest titles are The Modern Security Operations Center and CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide. When Joseph is not using technology, you can find him on the futbal field. Follow Joseph @SecureBlogger. Skill Level: Beginner to intermediary Learn How To: Become a better security professional Build your own Zero Trust journey Understand the true meaning of the Zero Trust security framework Determine how to apply security best practices represented in the latest Zero Trust framework to your organization Understand how to assess your existing security capabilities and map out a plan for improving your organization's security practices Understand security best practices for all areas of your business (cloud, endpoint, and network) Course requirement: Fundamental understanding of network and security concepts Who Should Take This Course: Anyone involved in security architecture and decision-making must have a clear understanding of Zero Trust concepts, which cover job roles in cloud, network, and application security, spanning an entire organization. This course benefits those entering security roles as well as existing careers looking to better understand Zero Trust concepts. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Descripción Física:1 online resource (1 video file (6 hr., 39 min.)) : sound, color.
Tiempo de Juego:06:39:00
ISBN:9780138251826
0138251827