________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Zero Trust Security Architecture Design Course
This course is taught in online format and consists of 10 units. The duration of the course is 70 hours that distributes between the content and the collaboration tools. Upon completion, the student will receive a certificate of completion.
The training is conducted through our Virtual Campus : With this format, you will have access to all the course content on the platform, available 24/7 from the start of the course. Students will also have access to... participation forums , as well as a continuous tutoring .
The course is taught in e-learning modality (100% discount option). In-person and online training courses are also available on demand.
Introduction
In this course you will learn to design and create strategies for a Zero Trust-based Security architecture .
Addressed to
This course is aimed at IT security professionals, network and systems administrators, and software developers who want to learn the principles and best practices of a Zero Trust-based security architecture.
Course content
- Understanding the principles of zero trust
- Development of security requirements based on business objectives
- Translating security requirements into technical capabilities
- Safety design for a robust solution
- Designing a security strategy for hybrid and multi-user environments
- Case study discussion: Creating a general security strategy and architecture
- Security operations planning for hybrid and multicloud environments
- Design of a SIEM and SOAR strategy
- Security strategies for incident management
- Security operations for technical threat intelligence
Prerequisites
The course does not require specific prior knowledge, but it is recommended to have basic knowledge of computer security, networks and cloud computing.
Other training modalities