pds-it
['Product detail page','no']
IT security / information security & data privacy
The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration

Zero Trust in practice: the path to secure IT in the company

Effective strategies and measures to prevent and defend against security incidents and cyber attacks
Online
1 day
German
Download PDF
€ 890,-
plus VAT.
€ 1.059,10
incl. VAT.
Booking number
41191
Venue
Online
3 dates
€ 890,-
plus VAT.
€ 1.059,10
incl. VAT.
Booking number
41191
Venue
Online
3 dates
Become a certified
Machine Learning Engineer
This course is part of the certified Master Class "Machine Learning Engineer". If you book the entire Master Class, you save over 15 percent compared to booking this individual module.
To the Master Class
In-house training
In-house training for your Employees only - exclusive and effective.
Inquiries
In cooperation with
Security breaches and cyber attacks are among the greatest threats to companies and pose major challenges for IT administrator and security officers. The Zero Trust framework is one of the most effective security models for comprehensively securing modern IT infrastructures and making them resilient to threats. In this hands-on training , you will learn how to leave traditional, perimeter-based approaches behind with Zero Trust and proactively arm yourself against cyber attacks. The training provides you with in-depth knowledge of the concept of perimeter-less security and shows you how to develop and successfully implement a Zero Trust strategy. You will learn how to protect yourself against current threats and vulnerabilities while continuously developing your security strategy.
Contents

1. introduction to the Zero Trust Security Framework

  • Attack patterns, attack vectors and effects of cyber attacks
  • Weaknesses of traditional perimeter-based security approaches and the need for change
  • Zero Trust: The new paradigm in cyber security and its background
  • Introduction to the concept of perimeter-less security and implications for modern IT infrastructures
  • Overview of the Zero Trust Security Framework and its core principles
  • How Zero Trust responds to current attacks, threats and vulnerabilities

2. strategies and roadmap for the zero trust transformation

  • Development of a zero trust strategy and a zero trust security concept
  • Step-by-step creation of a concrete zero trust roadmap 
  • Continuous adaptation of the security strategy to withstand changing threats
  • Implementation of Zero Trust as a long-term, ongoing process

3. implementation of the Zero Trust strategy in concrete measures

  • Challenges and stumbling blocks on the way to Zero Trust implementation and how to overcome them 
  • Best practices for the introduction of Zero Trust in hybrid and cloud-based environments
  • Identity and access management, network segmentation, endpoint protection and continuous monitoring
  • Simulation games with concrete cyberattacks: Worst- and best-case scenarios with concrete measures to prevent and contain cyberattacks
Your benefit

You understand how the Zero Trust security model works and how it responds to current threats.

 

You will learn how to develop a zero trust strategy and implement it step by step in your company.

 

You can integrate Zero Trust into hybrid and cloud-based IT environments and master the implementation.

 

You will test specific attack scenarios in simulation games and will be able to react quickly and efficiently to specific cyber attacks and minimize their impact.

trainer
Yannick Hirt
Methods

This training training is conducted in a group of a maximum of 12 participants using the Zoom video conferencing software.

 

Individual support from the trainers is guaranteed - in the virtual classroom or individually in break-out sessions.

Final examination
Recommended for

This course is aimed at anyone who wants to contribute to improved IT security, in particular IT security managers (CISOs, IT security officers), IT specialists (security engineers and system administrators) and IT management executives (CTO, CIO).

Start dates and details

Form of learning

Learning form

9.9.2025
Online
Places free
Implementation secured
Online
Places free
Implementation secured
20.1.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured
13.3.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured
Do you have questions about training?
Call us on +49 761 595 33900 or write to us at service@haufe-akademie.de or use the contact form.