• Online, Self-Paced
Course Description

This course will explore the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.

Learning Objectives

Understand the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas