Thank you for sending your enquiry! One of our team members will contact you shortly.        
        
        
            Thank you for sending your booking! One of our team members will contact you shortly.        
    Course Outline
Introduction
- Zero Trust vs traditional perimeter security
 
Overview of BeyondCorp Architecture and Design Principles
Understanding Network Segmentation
Implementing a Perimeterless Design
Knowing Users and their Devices
Authenticating and Authorizing Users
Data Encryption
Maintaining Productivity While Improving Security
The User Experience
Troubleshooting
Summary and Next Steps
Requirements
- An understanding of networking concepts
 - An understanding of enterprise security
 
Audience
- Network engineers
 - Cyber security professionals
 - System architects
 - IT managers
 
             14 Hours