Cargando…

The zero trust framework.

5+ Hours of Video Instruction Gives you a vendor-agnostic approach to secure access and resource protection. Overview: Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000ngm a22000007i 4500
001 OR_on1393444351
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230814s2023 xx 399 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |a 9780138251826  |q (electronic video) 
020 |a 0138251827  |q (electronic video) 
029 1 |a AU@  |b 000075033506 
035 |a (OCoLC)1393444351 
037 |a 9780138251826  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20230814 
049 |a UAMI 
245 0 4 |a The zero trust framework. 
246 3 |a 0 trust framework 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Pearson,  |c [2023] 
300 |a 1 online resource (1 video file (6 hr., 39 min.)) :  |b sound, color. 
306 |a 063900 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Joseph Muniz, presenter. 
520 |a 5+ Hours of Video Instruction Gives you a vendor-agnostic approach to secure access and resource protection. Overview: Never trust/always verify. This is the core tenant of Zero Trust, but this is easier said than done. But what is zero trust; why should you care about it, and how do you get started? The Zero Trust Framework is a 5-hour video course that answers all these questions and helps you build the skills needed for your Zero Trust journey. You'll learn how to talk about Zero Trust as well as how to use Zero Trust concepts to improve the security of your organization, regardless of where you are in that journey. Included throughout are real-life use cases, assessment methodologies, and maturity ranking techniques that will help you create a customized Zero Trust journey specific to your line of business. Topics include network, endpoint, and cloud security concepts. The course starts by providing an overview of key security concepts covering the foundational security knowledge needed. It then examines misconceptions, such as how Zero Trust best practices can't be achieved by simply acquiring a technology like a firewall, identity management solution, or network access control offering. With a strong focus on revolutionizing your defense strategy using the Zero Trust framework, this is a must for anyone who is responsible for the security of their organization. Bestselling author, trainer, and cyber practitioner Joseph Muniz uses his expertise to discuss the modern standards of the Zero Trust framework. He demonstrates his methodology by working through NIST, the Open Group, and a generic view of Zero Trust from principles to architecture. Topics in this course include Why Care About Security and Zero Trust Security Fundamentals Zero Trust Beginning Zero Trust Principles Open Group Architecture NIST 800-207 Architecture Generalized Zero Trust Architecture Build Your Own Zero Trust Journey About the Instructor Joseph Muniz is the director of business development for security solutions at Microsoft and a security researcher. He is driven to make the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architecture as a trusted advisor for the top Fortune 500 corporations and the U.S. government. Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. He runs thesecurityblogger.com website, a popular resource for security and product implementation. He is the author and contributor of several publications, including titles ranging from security best practices to exploitation tactics. Joseph's latest titles are The Modern Security Operations Center and CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide. When Joseph is not using technology, you can find him on the futbal field. Follow Joseph @SecureBlogger. Skill Level: Beginner to intermediary Learn How To: Become a better security professional Build your own Zero Trust journey Understand the true meaning of the Zero Trust security framework Determine how to apply security best practices represented in the latest Zero Trust framework to your organization Understand how to assess your existing security capabilities and map out a plan for improving your organization's security practices Understand security best practices for all areas of your business (cloud, endpoint, and network) Course requirement: Fundamental understanding of network and security concepts Who Should Take This Course: Anyone involved in security architecture and decision-making must have a clear understanding of Zero Trust concepts, which cover job roles in cloud, network, and application security, spanning an entire organization. This course benefits those entering security roles as well as existing careers looking to better understand Zero Trust concepts. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video. 
588 |a Online resource; title from title details screen (O'Reilly, viewed August 14, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Muniz, Joseph,  |e presenter. 
710 2 |a Pearson (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780138251826/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP