From the course: Understanding Zero Trust
Using Zero Trust to protect against cyberattack
From the course: Understanding Zero Trust
Using Zero Trust to protect against cyberattack
- [Malcolm] The traditional model of a firewalled enterprise, separating the untrusted outsiders from the trusted insiders, is no longer viable. Our employees often work remotely, we see examples of insider threats, and we see attackers penetrating the perimeter and moving with ease inside our networks, taking advantage of the trust between internal systems. In this LinkedIn Learning course, you'll learn how to better protect your networks and systems by adopting what's become known as a zero trust approach to access control. I'm Malcolm Shore and I've spent a career helping governments and businesses take advantage of emerging security concepts to provide better protection for their networks and systems. Now, let's get started understanding zero trust.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.