Course Outline

Introduction

  • Zero Trust vs. Traditional Perimeter Security for Government

Overview of BeyondCorp Architecture and Design Principles for Government

Understanding Network Segmentation for Government

Implementing a Perimeterless Design for Government

Knowing Users and Their Devices for Government

Authenticating and Authorizing Users for Government

Data Encryption for Government

Maintaining Productivity While Improving Security for Government

The User Experience for Government

Troubleshooting for Government

Summary and Next Steps for Government

Requirements

  • An understanding of networking concepts for government
  • An understanding of enterprise security

Audience

  • Network engineers
  • Cybersecurity professionals
  • System architects
  • IT managers
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories