Ir al contenido principal

LinuxFoundationX: Introduction to Zero Trust

Learn the fundamentals of Zero Trust and how open-source tools such as SPIFFE and SPIRE can be used to deploy Zero Trust in your architecture.

Introduction to Zero Trust
7 semanas
1–2 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 17 may

Sobre este curso

Omitir Sobre este curso

This course is designed for developers, operators, security professionals, and architects working on medium to large microservice-based systems, as well as IT leaders and policy decision-makers looking to enhance security within their organization.

This course discusses the features and characteristics of a Zero Trust Architecture, the different models of trust and use cases, and provides opportunities for hands-on practice with open source tools such as SPIFFE/SPIRE, Open Policy Agent, and Istio service mesh.

You will be equipped with the tools and insights to navigate the increasingly significant landscape of Zero Trust Networks, which are the practical implementations of a Zero Trust Architecture, aimed at securing a network by adhering to Zero Trust practices. This knowledge will help prepare you to apply them in real-world scenarios, facilitating robust network security by adopting a 'Never Trust, Always Verify' approach.

De un vistazo

  • Institution LinuxFoundationX
  • Subject Informática
  • Level Intermediate
  • Prerequisites
    • Practical experience with cloud computing and Infrastructure-as-Service (IaaC)
    • Experience with deploying and operating container orchestration platforms based on Kubernetes is a plus
    • Access to a device or virtual machine running a Linux operating system. Lab exercises have been tested on Ubuntu 22.04
  • Language English
  • Video Transcript English

Lo que aprenderás

Omitir Lo que aprenderás
  • The flaws of perimeter-based network security and how it gave rise to Zero Trust
  • The importance of Zero Trust in securing modern, microservice-based environments which face complexity creep and an evolving threat landscape
  • Fundamental assertions of Zero Trust Networks and basics of Zero Trust Architectures
  • The technology fundamentals key to building Zero Trust Networks, such as cryptography and trust
  • The different models of trust used to achieve Zero Trust.
  • The importance of workload identities and how they are achieved in the context of Zero Trust Networks
  • The different use cases in which you can apply Zero Trust
  • How to achieve Zero Trust using open source tooling such as SPIFFE/SPIRE, OPA, and Istio service mesh

Plan de estudios

Omitir Plan de estudios
  1. Welcome to LFS183x
  2. Zero Trust Fundamentals
  3. Why Do We Care about Zero Trust
  4. Technology Fundamentals: Cryptography and Trust
  5. Managing Trust in the Cloud

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.