From the course: Understanding Zero Trust

Using Zero Trust to protect against cyberattack

From the course: Understanding Zero Trust

Using Zero Trust to protect against cyberattack

- [Malcolm] The traditional model of a firewalled enterprise, separating the untrusted outsiders from the trusted insiders, is no longer viable. Our employees often work remotely, we see examples of insider threats, and we see attackers penetrating the perimeter and moving with ease inside our networks, taking advantage of the trust between internal systems. In this LinkedIn Learning course, you'll learn how to better protect your networks and systems by adopting what's become known as a zero trust approach to access control. I'm Malcolm Shore and I've spent a career helping governments and businesses take advantage of emerging security concepts to provide better protection for their networks and systems. Now, let's get started understanding zero trust.

Contents