This is a one-day course that provides a comprehensive understanding of cybersecurity, focusing on the complexities of the cybersecurity landscape, cryptography, and the influence of users, devices, and applications on the security perimeter. The course also introduces the Zero Trust framework as a strategy to enhance cybersecurity.
This course introduces the fundamentals of cybersecurity and the principles of a Zero Trust strategy. In the first module, students are introduced to the basics of cybersecurity, gaining an understanding of the overall landscape, the role of encryption, the importance of user verification and access control, and the necessity of network and data protection. The module also emphasizes that every device can be a potential attack vector and discusses the vulnerabilities that can exist within applications.
The second module of the course focuses on the concept of a Zero Trust framework, a strategy that can help mitigate cyberattacks and safeguard an organization's assets. This part of the course covers the five core pillars of Zero Trust: identity, endpoints, applications, networks, and data. Students will learn how a Zero Trust strategy can be used to verify a user's identity, manage endpoints, control application behavior, protect networks, and secure data. By the end of this module, students will have a comprehensive understanding of the benefits of a Zero Trust strategy, its role in user identity verification and access management, endpoint protection, application behavior control, network protection, and data security.