This course will explore the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.
Learning Objectives
Understand the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):