basic knowledge of Windows administration, Active Directory and network infrastructure
In the modern world of “work from anywhere”, it is more important than ever to aim for a Zero Trust solution. Zero Trust has a very negative vibe to it, but I believe that everyone wants it, when you just think about what it really aims to achieve: To be able to work the same way, and as securely, from your corporate office or Starbucks. Stop building internal networks and treat your offices like WLAN hotspots – You offer internet access the same as the users’ home network would – that’s it!
On this course you will learn:
o build networks according to the Zero Trust -model
tory and control your devices and applications
nticate users and devices in a strong manner
ol your privileges and binary
or and report continuously
If done correctly, a Zero Trust architecture results in higher overall levels of security, but also in reduced security complexity and operational overhead.
this course is good for IT- or security admins, or project leads
Day 1:
- Introduction to Zero Trust
- Getting rid of “internal networks”
- Network segmentation and micro-segmentation
Day 2:
- Implementing Multi-Factor Authentication (MFA)
- Going Passwordless
- Verifying device integrity
- Implementing Principle of Least Privilege
Day 3:
- Implementing binary control (Allow-Listing)
- Implementing SIEM and SoC
https://www.etc.at/seminare/ZeroTrust