Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Zero Trust vs. Traditional Perimeter Security for Government
Overview of BeyondCorp Architecture and Design Principles for Government
Understanding Network Segmentation for Government
Implementing a Perimeterless Design for Government
Knowing Users and Their Devices for Government
Authenticating and Authorizing Users for Government
Data Encryption for Government
Maintaining Productivity While Improving Security for Government
The User Experience for Government
Troubleshooting for Government
Summary and Next Steps for Government
Requirements
- An understanding of networking concepts for government
- An understanding of enterprise security
Audience
- Network engineers
- Cybersecurity professionals
- System architects
- IT managers
14 Hours