Zero Trust Network Access (ZTNA), Carta and SDP
- Code training GKZTNACS
- Duur 1 dag
Andere trainingsmethoden
Ga naar:
Methode
Deze training is in de volgende formats beschikbaar:
-
Class Connect
Verbind naar een klas in HD
-
E-learning (in je eigen tempo)
Elektronisch leren in je eigen tempo
-
Klassikale training
Klassikaal leren
-
Op locatie klant
Op locatie klant
-
Virtueel leren
Virtueel leren
Vraag deze training aan in een andere lesvorm.
Trainingsbeschrijving
Naar bovenIn deze eLearning Zero Trust Network Access (ZTNA), CARTA en SDP worden de concepten van Zero Trust en Carta uitgelegd en de implementatie met een Software Defined Perimeter (SDP) en Micro-segmentatie toegelicht.
Het Zero Trust model in IT security is al in 2009 bedacht door Forrester. Zoals de naam zegt, overal en altijd moet de sterkste vorm van security (b.v authenticatie, authorisatie en encryptie) toegepast worden.
Het huidige netwerk model (perimeter model met een DMZ) kan niet op tegen geavanceerde bedreigingen zoals APT’s (Advanced Persistent Threats) en DDOS aanvallen. Is het niet vreemd dat het meest gebruikte transport protocol uitgaat van: eerst verbinden, dan authenticeren? Het IP adres was nooit bedoeld als authenticatie middel maar is wel makkelijk om een verbinding mee op te zetten… Met Zero Trust Network Access is het netwerk “donker”: een niet geauthenticeerde entiteit kan NIETS zien.
===
English:
n this e-Learning course Zero Trust Network Access (ZTNA), CARTA and SDP you'll learn the concepts of Zero Trust and Carta are explained and the implementation with a Software Defined Perimeter (SDP) and Micro-segmentation clarified.
The term Zero Trust model was coined by Forrester in 2009. As the name says, everywhere and anytime the highest form of security (authentication, authorization, encryption etc.) must be enforced.
The current network model (perimeter model with a DMZ) does not offer sufficient protection against threats like APT’s (Advanced Persistent Threats) or DDOS attacks. Don’t you think it is strange that the most popular transport protocol is based on: connect first, then authenticate? The IP-address was never meant for authentication, it is very convenient for making a connection. With Zero trust the network is completely dark: unauthenticated you cannot see anything…
Doelgroep
Naar boven- Anyone who wants to know about the latest trends in IT security
Trainingsdoelstellingen
Naar boven- Understand the need for Zero Trust Network Access
- Identify the challenges with the traditional network design
- Describe the implications of the changed environment and the cloud
- Explain the problems with TCP/IP
- Understand the concept of Named Data Networking
- Describe the internet threat model
- Identify the features of Zero Trust Network Access
- Understand how to implement Zero Trust Network Access
- Explain the advantages of Zero Trust Network Access
- Identify Zero Trust solutions as Software Defined Perimeter and Micro-segmentation
- Understand the concept of CARTA
- Identify the 7 imperatives of CARTA
- Explain why you need CARTA
- Describe UEBA and the relationship with CARTA
- Identify the importance of Artificial Intelligence and Machine Learning in IT security
- Explain the features of a SDP solution
- Understand the architecture of SDP
- Understand the problems with VPN
- Describe the features of Single Packet Authorization (SPA)
- Describe static versus dynamic firewall
- Explain the importance of Points of Presence (PoP)
- Understand the advantages of SDP
- Explain how SDP enables micro-segmentation
- List the most important vendors of SDP solutions
- Identify the critical factors when choosing a SDP product
Inhoud training
Naar boven- What are the features of Zero Trust Network Access
- Problems with the current network and security model
- The changed environment: BYOD, working from home (or anywhere)
- North-south opposed to east-west traffic
- How to implement ZTNA
- The future of the internet: Named Data Networking (NDN)
- What is CARTA an why do I need it?
- The features of CARTA: the 7 imperatives of CARTA
- Relationship CARTA and UEBA (User and Entity Behavior Analytics)
- AI/ML and IT security
- What is SDP and how does it work?
- SDP architecture
- VPN versus SDP
- Single Packet Authorization
- Static and dynamic firewalls
- The advantages of SDP
- What is micro-segmentation and how does it work
- Vendors SDP and micro-segmentation
Voorkennis
Naar boven- Basic internet usage skills
Vervolgtrainingen
Naar boven- The latest trends in Cloud security: CASB, SD-WAN and SASE Training (GKCSS)
- #000000