________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course description. Design of a Zero Trust Security Architecture
This course is taught in online mode and consists of 10 units. The duration of the course is 70 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
Introduction
In this course you will learn how to design and create strategies for a Security architecture based on Zero Trust .
Addressed to
This course is aimed at computer security professionals, network and system administrators, and software developers who want to learn the principles and best practices of a Security architecture based on Zero Trust.
Course content
- Understand the principles of zero trust
- Development of security requirements based on business objectives
- Translate security requirements into technical capabilities
- Security design for a robust solution
- Design of a security strategy for hybrid and multi-user environments
- Case Study Discussion: Creating an Overall Security Strategy and Architecture
- Security operations planning for hybrid and multicloud environments
- Design of a SIEM and SOAR strategy
- Security strategies for incident management
- Security operations for technical threat intelligence
Previous requirements
The course does not require specific prior knowledge, but it is recommended to have basic notions of computer security, networks and cloud computing.
Other training modalities