1. introduction to the Zero Trust Security Framework
2. strategies and roadmap for the zero trust transformation
3. implementation of the Zero Trust strategy in concrete measures
You understand how the Zero Trust security model works and how it responds to current threats.
You will learn how to develop a zero trust strategy and implement it step by step in your company.
You can integrate Zero Trust into hybrid and cloud-based IT environments and master the implementation.
You will test specific attack scenarios in simulation games and will be able to react quickly and efficiently to specific cyber attacks and minimize their impact.
This training training is conducted in a group of a maximum of 12 participants using the Zoom video conferencing software.
Individual support from the trainers is guaranteed - in the virtual classroom or individually in break-out sessions.
This course is aimed at anyone who wants to contribute to improved IT security, in particular IT security managers (CISOs, IT security officers), IT specialists (security engineers and system administrators) and IT management executives (CTO, CIO).
Form of learning
Learning form
No filter results