Online Training
Vulnerability Management in Zero Trust
This learning experience invites you to review essential principles and best practices of zero trust vulnerability management, including asset discovery, risk-based trust assessment, and integration with policy enforcement mechanisms inherent to zero trust.
Course Summary
This learning experience reviews vulnerability management as a crucial component in cybersecurity operations, specifically in Zero Trust Architecture (ZTA). It focuses on essential principles and best practices such as asset discovery, risk-based trust assessment, and integration with zero trust policy enforcement mechanisms. Throughout your learning, you will review the identification, assessment, prioritization, and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.
CPE Reporting
CPE credits earned for this course may be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
Members: Starting January 1st, 2022, CPE Credits for ISC2 credentials will be reported by Member Services on the 1st of every month. Please allow 10 business days for processing. Courses completed prior to 1/1/2022 will need to be self-reported by members and associates through the ISC2 CPE Portal accessible via www.isc2.org using your member login credentials.
For specific questions related to your CPE credits or the CPE portal please contact member support - membersupport@isc2.org
-->