Zero Trust Training (ZTT)
Preparation is half the battle. Take a tangible step towards implementing zero trust within your organization.View Available Courses
Zero trust is more than just a buzzword, it’s the new reality for organizations. Experts now recommend that organizations “never trust, always verify” before allowing any access to resources, but what does that actually mean? How can you start implementing zero trust within your organization?
CSA is developing a training program to give you the knowledge needed to understand the core concepts of zero trust and the skills required to implement the principles to reduce systemic risk and move your organization towards zero trust. The Zero Trust Training (ZTT) curriculum will cover eight areas of Zero Trust knowledge, including strategy and governance, architecture, planning and implementation, identity, device security and more. Each area is composed of multiple training modules that will include a study guide and be delivered as a self-paced, online course. A certificate of course completion and CPE credits are available.
This course was developed by crowd-sourcing the collective experience of the industry. CSA ensured that the perspective of all stakeholders were taken into consideration including: zero trust consultants, existing and potential users, product vendors and more.
Recommended Prerequisites: While this course doesn’t require prerequisites, we recommend that students have at least a basic understanding of networks and network security. It is also recommended to have taken the Certificate of Cloud Security Knowledge (CCSK) first.
What are the benefits?
Understand what zero trust is, its benefits, various implementation approaches, and some of its possible use cases.
Be able to secure enterprise resources from unauthorized users through authentication and authorization procedures.
Learn how to migrate an organization to a Zero Trust Architecture and leverage SDP to isolate services on untrusted networks.
Who should enroll in this training?
Self-Paced Training Overview
Each course comes with its own study guide that is included with your purchase. Each course will also provide you with a certificate of course hours that can be submitted for possible CPE credits.
Zero Trust PlanningComing Soon...
Related Study Materials
The official study guide for each course is included in the self-paced training. Below are additional materials referenced in the course.
It's time to Zero In on Zero Trust
Tune into these webinars to learn the ins and outs of this increasingly popular approach to cybersecurity, helping you come to an understanding of why it is needed today, what the key principles are, and how to implement it into your business planning, enterprise architectures, and technology deployments.
Zero Trust Architecture/SDP training is a one-stop-shop training that provides a comprehensive introduction to ZTT. It makes any other foundational training on ZTT totally unnecessary. The training provides a high-level holistic view of Zero Trust Architecture (ZTT) where it covers ZT foundations, objectives, benefits, planning considerations, implementation options, various use cases, and applications of ZT.
Sr. Information Security Compliance Advisor, Akamai Technologies
While I have seen some commercial training used as a marketing initiative, I have not seen academia embrace ZTA yet. As with any concept introduction, educating the university population will seed our organizations with the knowledge and skills needed to adopt and implement ZTA. Although ZTA has become popular as a recent buzz term, there is very little actionable information about this important security assertion and I believe this training will help fill that gap.
Professor of Practice, Capitol Technology University
This could be the first such training where the Zero Trust and Software Defined Perimeter(SDP) is explained from the perspectives of real-world industry implementation as a journey to achieve Zero Trust access for the network and applications. As someone who has planned and implemented Zero Trust Access across customer environments, it was indeed a great experience and privilege for me to be part of the global Zero Trust expert team and collaborate over the training materials.
Head - Information Security, Verse Innovation
CSA thanks the many participants who contributed in the development, editing, and review processes for our Zero Trust Training courses. Contributors are made up of credentialed security professionals in the industry, and other engaged stakeholders who support the growth of cloud security training.
If you have any questions or have interest in participating in Zero Trust Training course development, please email [email protected].