Get in Touch

Course Outline

Introduction

  • Zero Trust versus traditional perimeter security.

Overview of BeyondCorp Architecture and Design Principles

Understanding Network Segmentation

Implementing a Perimeterless Design

Identifying Users and Their Devices

Authenticating and Authorizing Users

Data Encryption

Maintaining Productivity While Enhancing Security

The User Experience

Troubleshooting

Summary and Next Steps

Requirements

  • A foundational understanding of networking concepts.
  • A foundational understanding of enterprise security.

Audience

  • Network engineers.
  • Cybersecurity professionals.
  • System architects.
  • IT managers.
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories