Zero trust is more than just a buzzword, it’s the new reality for organizations. Experts now recommend that organizations “never trust, always verify” before allowing any access to resources, but what does that actually mean? How can you start implementing zero trust within your organization?
CSA has developed training to give you the knowledge needed to understand the core concepts of zero trust and the skills required to implement the principles to reduce systemic risk and move your organization towards zero trust. The Zero Trust Training (ZTT) curriculum covers essential areas of zero trust knowledge, including strategy and governance, architecture, planning and implementation, identity, device security and more. A certificate of course completion and Continuing Educational Credits are available. These courses are only offered in English. The ZTT serves as the body of knowledge for CSA’s Certificate of Competence in Zero Trust , the industry’s first authoritative, vendor-neutral Zero Trust credential that provides the knowledge needed to understand the core concepts of Zero Trust.
This course was developed by crowd-sourcing the collective experience of the industry. CSA ensured that the perspective of all stakeholders were taken into consideration including: zero trust consultants, existing and potential users, product vendors and more.
Introducing the industry's first authoritative Zero Trust training and certification: The Certificate of Competence in Zero Trust (CCZT) is now available!
Recommended Prerequisites: While this course doesn’t require prerequisites, we recommend that students have at least a basic understanding of networks and network security. It is also recommended to have taken the Certificate of Cloud Security Knowledge (CCSK) first.
What are the benefits?
Understand what zero trust is, its benefits, various implementation approaches, and some of its possible use cases.
Be able to secure enterprise resources from unauthorized users through authentication and authorization procedures.
Learn how to migrate an organization to a Zero Trust Architecture and leverage SDP to isolate services on untrusted networks.
Who should enroll in this training?
Certificate of Competence in Zero Trust (CCZT) Training Bundle
Each course comes with its own study guide included with your purchase. Additionally you will be provided with a CCZT exam token to be redeemed on CSA Exams.
Introduction to Zero Trust Architecture
Introduction to Software-Defined Perimeter
Zero Trust Planning
Zero Trust Implementation
Additional Zero Trust Courses
These trainings dive into specific implementation examples, deployments, architectures, and other topics that are not required to know as part of the CCZT exam body of knowledge.
Related Study Materials
The official study guide for each course is included in the self-paced training. Below are additional materials referenced in the course.
CISA’s Zero Trust Maturity Model: An Important Step Forward in Implementing Zero Trust Security Principles
It's time to Zero In on Zero Trust
Tune into these webinars to learn the ins and outs of this increasingly popular approach to cybersecurity, helping you come to an understanding of why it is needed today, what the key principles are, and how to implement it into your business planning, enterprise architectures, and technology deployments.
Zero Trust Architecture/SDP training is a one-stop-shop training that provides a comprehensive introduction to ZTT. It makes any other foundational training on ZTT totally unnecessary. The training provides a high-level holistic view of Zero Trust Architecture (ZTT) where it covers ZT foundations, objectives, benefits, planning considerations, implementation options, various use cases, and applications of ZT.
Sr. Information Security Compliance Advisor, Akamai Technologies
While I have seen some commercial training used as a marketing initiative, I have not seen academia embrace ZTA yet. As with any concept introduction, educating the university population will seed our organizations with the knowledge and skills needed to adopt and implement ZTA. Although ZTA has become popular as a recent buzz term, there is very little actionable information about this important security assertion and I believe this training will help fill that gap.
Professor of Practice, Capitol Technology University
This could be the first such training where the Zero Trust and Software Defined Perimeter(SDP) is explained from the perspectives of real-world industry implementation as a journey to achieve Zero Trust access for the network and applications. As someone who has planned and implemented Zero Trust Access across customer environments, it was indeed a great experience and privilege for me to be part of the global Zero Trust expert team and collaborate over the training materials.
Senior Security Architect at VerSe Innovation
Contribute to Zero Trust Trainings
CSA thanks the many participants who contributed in the development, editing, and review processes for our Zero Trust Training courses. Contributors are made up of credentialed security professionals in the industry, and other engaged stakeholders who support the growth of cloud security training.
If you have any questions or have interest in participating in Zero Trust Training course development, please email [email protected].