Course Outline

Introduction

  • Comparison of Zero Trust and Traditional Perimeter Security for Government

Overview of BeyondCorp Architecture and Design Principles for Government

Understanding Network Segmentation for Government Operations

Implementing a Perimeterless Design for Enhanced Security in Government

Knowing Users and Their Devices for Government Agencies

Authenticating and Authorizing Users for Government Systems

Data Encryption for Government Information Protection

Maintaining Productivity While Improving Security for Government Workforces

The User Experience in a Zero Trust Environment for Government Employees

Troubleshooting Common Issues in Zero Trust Implementations for Government

Summary and Next Steps for Government Agencies Adopting Zero Trust

Requirements

  • An understanding of networking concepts for government
  • An understanding of enterprise security

Audience

  • Network engineers
  • Cybersecurity professionals
  • System architects
  • IT managers
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories