Skip to main content

LinuxFoundationX: Introduction to Zero Trust

Learn the fundamentals of Zero Trust and how open-source tools such as SPIFFE and SPIRE can be used to deploy Zero Trust in your architecture.

Introduction to Zero Trust
7 weeks
1–2 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

After a course session ends, it will be archivedOpens in a new tab.
Starts May 8

About this course

Skip About this course

This course is designed for developers, operators, security professionals, and architects working on medium to large microservice-based systems, as well as IT leaders and policy decision-makers looking to enhance security within their organization.

This course discusses the features and characteristics of a Zero Trust Architecture, the different models of trust and use cases, and provides opportunities for hands-on practice with open source tools such as SPIFFE/SPIRE, Open Policy Agent, and Istio service mesh.

You will be equipped with the tools and insights to navigate the increasingly significant landscape of Zero Trust Networks, which are the practical implementations of a Zero Trust Architecture, aimed at securing a network by adhering to Zero Trust practices. This knowledge will help prepare you to apply them in real-world scenarios, facilitating robust network security by adopting a 'Never Trust, Always Verify' approach.

At a glance

  • Institution: LinuxFoundationX
  • Subject: Computer Science
  • Level: Intermediate
  • Prerequisites:
    • Practical experience with cloud computing and Infrastructure-as-Service (IaaC)
    • Experience with deploying and operating container orchestration platforms based on Kubernetes is a plus
    • Access to a device or virtual machine running a Linux operating system. Lab exercises have been tested on Ubuntu 22.04
  • Language: English
  • Video Transcript: English

What you'll learn

Skip What you'll learn
  • The flaws of perimeter-based network security and how it gave rise to Zero Trust
  • The importance of Zero Trust in securing modern, microservice-based environments which face complexity creep and an evolving threat landscape
  • Fundamental assertions of Zero Trust Networks and basics of Zero Trust Architectures
  • The technology fundamentals key to building Zero Trust Networks, such as cryptography and trust
  • The different models of trust used to achieve Zero Trust.
  • The importance of workload identities and how they are achieved in the context of Zero Trust Networks
  • The different use cases in which you can apply Zero Trust
  • How to achieve Zero Trust using open source tooling such as SPIFFE/SPIRE, OPA, and Istio service mesh
  1. Welcome to LFS183x
  2. Zero Trust Fundamentals
  3. Why Do We Care about Zero Trust
  4. Technology Fundamentals: Cryptography and Trust
  5. Managing Trust in the Cloud

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.