Course Overview
Learning Objectives
- Understand ZTA architecture and the problems it solves
- Identify and review technology components required for ZTA enforcement
- Identify zero trust network access (ZTNA) as a component of ZTA
- Configure captive portal and agents for securely onboarding devices to the corporate, guest, and BYOD networks
- Configure security policies for onboarding and compliance, and provide dynamic access based on configured criteria
- Configure FortiGate ZTNA with tagging rules for dynamic groups and securing application access
- Configure endpoint posture and compliance checks, and monitor the status of connected endpoints
- Explain the role of a centralized logging platform (FortiAnalyzer)
- Explore remediation options to automate incident response for both on-net and off-net devices
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):