Top of Page
 

Defining the Boundaries of Zero Trust

Price: $46.00
Quantity:

< Return to Listing

 

This learning experience invites you to review the set of guiding principles for workflow, system design, and operations that create a zero trust architecture.

Course Summary

This learning experience reviews the principles and requirements necessary to transition from the traditional approach of perimeter-based security to a security operating model focused on granular trust-relationships that are business-enabling and data-centric. Throughout your learning, you will identify the importance of continual and vigilant analysis of the entire ecosystem; the requirements of specific models, business-needs, and use-cases; and the necessary components to implement in the context of zero trust.

CPE Reporting

CPE credits earned for this course may be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.

Members: Starting January 1st, 2022, CPE Credits for ISC2 credentials will be reported by Member Services on the 1st of every month. Please allow 10 business days for processing. Courses completed prior to 1/1/2022 will need to be self-reported by members and associates through the ISC2 CPE Portal accessible via www.isc2.org using your member login credentials.

For specific questions related to your CPE credits or the CPE portal please contact member support - membersupport@isc2.org

-->
Price: $46.00
Quantity: