Course Outline
Introduction
- Zero Trust vs traditional perimeter security
Overview of BeyondCorp Architecture and Design Principles
Understanding Network Segmentation
Implementing a Perimeterless Design
Knowing Users and their Devices
Authenticating and Authorizing Users
Data Encryption
Maintaining Productivity While Improving Security
The User Experience
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of networking concepts
- An understanding of enterprise security
Testimonials (7)
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill