Engineering and Technology
Learners leave the course with a reinvigorated perspective on cybersecurity and a lexicon of practices and solutions that support what is rapidly becoming the new dominant strategy in enterprise security.
The Udacity course on Zero Trust Security provides a comprehensive understanding of the zero trust security model. It begins with an analysis of a recently breached company's security approach, distinguishing between the perimeter network security model and the zero trust model, identifying areas for improvement, and understanding the recent cybersecurity trends that led to the adoption of zero trust models. The course then delves into the philosophical principles behind the zero trust movement, its foundational requirements, logical components, and pillars. Practical deployment resources, requirements for Zero Trust Network Architecture (ZTNA), and foundational capabilities for evaluating and refining safeguards are also covered. The course also assesses the readiness of an organization to adopt zero trust principles, evaluates challenges to implementation, and differentiates deployment strategies. Finally, the course project involves an analysis of a sample company's corporate profile and cybersecurity capabilities, evaluating its potential for implementing zero trust best practices, and creating a roadmap towards a Zero Trust Architecture.