Online Training
Security within Zero Trust
This course invites you to review how zero trust implementation can strategically strengthen the security posture of an organization.
Course Summary
This course reviews how zero trust implementation can strategically strengthen the security posture of an organization. Throughout your learning, you will consider the zero trust context of data classification; authentication policies; threat anticipation and evaluation; and risk management frameworks. Key Takeaways: 1) Review elements of an enterprise-wide data classification program 2) Connect access and authentication policies to zero trust implementation 3) Evaluate how to address and adapt to emerging threats 4) Assess and prioritize security measures based on risks and impact
CPE Reporting
CPE credits earned for this course may be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
Members: Starting January 1st, 2022, CPE Credits for ISC2 credentials will be reported by Member Services on the 1st of every month. Please allow 10 business days for processing. Courses completed prior to 1/1/2022 will need to be self-reported by members and associates through the ISC2 CPE Portal accessible via www.isc2.org using your member login credentials.
For specific questions related to your CPE credits or the CPE portal please contact member support - membersupport@isc2.org
-->