Companies Home Search Profile

Understanding Zero Trust

Focused View

Malcolm Shore

52:02

0 View
  • [1] Using Zero Trust to protect against cyberattack.mp4
    00:48
  • [2] What you should know.mp4
    00:39
  • [1] A brief history of technology trust.mp4
    04:34
  • [2] Concepts of software trust.mp4
    04:37
  • [3] A case study in failed trust.mp4
    01:44
  • [1] What is Zero Trust.mp4
    03:40
  • [2] The principles of Zero Trust.mp4
    07:19
  • [3] ACT-IAC and the six pillars of Zero Trust.mp4
    04:00
  • [4] Policy-based admission control.mp4
    02:46
  • [5] Zero Trust and the business context.mp4
    04:09
  • [6] Zero Trust data.mp4
    02:44
  • [7] An extended approach to Zero Trust.mp4
    05:13
  • [1] Building a Zero Trust foundation.mp4
    03:19
  • [2] Designing a policy engine.mp4
    02:15
  • [3] Examples of Zero Trust.mp4
    03:21
  • [1] Whats next.mp4
    00:54
  • Description


    The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it’s no longer a viable option in today’s world. Workers working remotely, insider threats, and attackers taking advantage of trust between internal systems—these demand a new approach to extending protection to all users and their devices, regardless of their location. In this course, Malcolm Shore shows how to better protect your networks and systems by adopting what’s known as a zero trust approach to access control—removing trust relationships in networks and requiring that trust decisions are made at the time that access is requested. Malcom starts with a brief history of the concept of software trust, before moving onto key facets of the zero trust approach, the reasons for wanting to minimize trust relationships in network architectures, and the tenets and models that have been proposed for zero trust.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 16
    • duration 52:02
    • English subtitles has
    • Release Date 2025/02/26