Zero Trust Training (ZTT)
Preparation is half the battle. Take a tangible step towards implementing zero trust within your organization.
View Available CoursesZero trust is more than just a buzzword, it’s the new reality for organizations. Experts now recommend that organizations “never trust, always verify” before allowing any access to resources, but what does that actually mean? How can you start implementing zero trust within your organization?
CSA is developing a training program to give you the knowledge needed to understand the core concepts of zero trust and the skills required to implement the principles to reduce systemic risk and move your organization towards zero trust. The Zero Trust Training (ZTT) curriculum will cover eight areas of Zero Trust knowledge, including strategy and governance, architecture, planning and implementation, identity, device security and more. Each area is composed of multiple training modules that will include a study guide and be delivered as a self-paced, online course. A certificate of course completion and Continuing Educational Credits are available. These courses are only offered in English.
This course was developed by crowd-sourcing the collective experience of the industry. CSA ensured that the perspective of all stakeholders were taken into consideration including: zero trust consultants, existing and potential users, product vendors and more.
Recommended Prerequisites: While this course doesn’t require prerequisites, we recommend that students have at least a basic understanding of networks and network security. It is also recommended to have taken the Certificate of Cloud Security Knowledge (CCSK) first.
What are the benefits?
Understand what zero trust is, its benefits, various implementation approaches, and some of its possible use cases.
Be able to secure enterprise resources from unauthorized users through authentication and authorization procedures.
Learn how to migrate an organization to a Zero Trust Architecture and leverage SDP to isolate services on untrusted networks.
Who should enroll in this training?
Self-Paced Training Overview
Each course comes with its own study guide that is included with your purchase. Each course will also provide you with a certificate of course hours that can be submitted for possible Continuing Educational Credits.

Introduction to Zero Trust Architecture
View Course
Introduction to Software-Defined Perimeter
View Course
Key Features & Technologies of Software-Defined Perimeter
View Course
Architectures & Components of Software-Defined Perimeter
View Course
Zero Trust Planning
View Course
Zero Trust Implementation
View CourseRelated Study Materials
The official study guide for each course is included in the self-paced training. Below are additional materials referenced in the course.
Resources


Related Videos
It's time to Zero In on Zero Trust
Tune into these webinars to learn the ins and outs of this increasingly popular approach to cybersecurity, helping you come to an understanding of why it is needed today, what the key principles are, and how to implement it into your business planning, enterprise architectures, and technology deployments.
Industry Support
Contribute to Zero Trust Trainings
CSA thanks the many participants who contributed in the development, editing, and review processes for our Zero Trust Training courses. Contributors are made up of credentialed security professionals in the industry, and other engaged stakeholders who support the growth of cloud security training.
If you have any questions or have interest in participating in Zero Trust Training course development, please email [email protected].