On Demand2 CE Credits
Defining the Boundaries of Zero Trust
Hosted by ISC2
Dates TBD Online / Virtual
Information Technology Services
About This Event
This on-demand course teaches cybersecurity professionals how to transition from traditional perimeter-based security to a zero trust security operating model. Learners will explore the core principles of zero trust, including identity-centric access controls, least privilege, microsegmentation, and granular trust relationships that are business-enabling and data-centric. The course includes text and video-based content, learning activities, and an assessment.
Topics Covered
Safety & Infection Control
IT risk assessment for CRISCzero-trust architecture implementationsecure network segmentationprivileged access managementendpoint protection and EDR deployment
Leadership & Management
strategic security roadmaps
AI Technology & Data
identity and access management designcloud security architecture for CCSP/AWS/Azure
Registration & Fees
Continuing Education
2 CE Credits
Accredited by: ISC2
Group A CPE credits. Field of Study: Security Operations. Credits automatically reported for ISC2 credentials on the first day of every month. May be eligible for non-ISC2 certifications.
Who This Event Is For
Industries
Information Technology Services
Professional Fields
Cybersecurity & Information AssuranceNetwork & InfrastructureIT Risk & Compliance
Professions
Cloud ArchitectsCompliance SpecialistsSecurity AnalystsSecurity EngineersEnterprise Architects