ZERO TRUST FOR ARCHITECTS

Sustainable Evolution’s Zero Trust for Architects course is designed to help you understand how to drive an initiative to gain a zero-trust security posture for your IT environment. The training is based on the guidance available from government entities, standards groups, and cloud-based products and services companies.

This instructor-guided online course is fourteen classroom hours long. Our typical delivery is six weeks long and includes suggested reading as homework between each session. We share our experience and strategies on how to assemble a team, scope out each pillar, and assess your current security state. We provide links to zero-trust content for the major cloud service providers.

Agenda:

Session 1. Zero Trust Overview

Session 2. Getting Started

Session 3. Secure Identities and Endpoints

Session 4. Secure Data and Apps

Session 5. Secure Infrastructure and Network

Session 6. Make it Real

Virtual Classroom

This course is delivered using an instructor-facilitated virtual environment. An online version of the course is scheduled for availability near the end of the third quarter of the calendar year 2023.

All times Pacific Time (UTC -08:00)

Digital Practitioner Body of Knowledge (DPBoK) schedule

〰️

Digital Practitioner Body of Knowledge (DPBoK) schedule 〰️

 PREREQUISITES

To get the most out of the course, you must be an architect focused on Zero-Trust initiatives for your organization and customers and be familiar with core concepts for achieving a Zero-Trust security posture.

Discounts

For government discounts, academic discounts, or private classes, email support@sustainableevolution.com. For the government or academic discount, use your government or student email address.

    1. Create a set of principles to guide a zero-trust initiative.

    2. Assess your current zero-trust maturity state.

    3. Use Forrester TEI reports to perform cost-benefit analysis on zero-trust initiatives.

    4. Use causality mapping to roadmap zero-trust initiatives to business objectives.

    5. Plan zero-trust solutions to achieve boundary and segment restructuring.

    6. Determine the skills needed for core and extended teams on zero-trust initiatives.

    7. Set a zero-trust strategy for identities.

    8. Set a zero-trust strategy for endpoints.

    9. Set a zero-trust strategy for networks.

    10. Set a zero-trust strategy for infrastructure.

    11. Set a zero-trust strategy for applications.

    12. Set a zero-trust strategy for data access and management.

    13. Automate security policy management.

    14. Use logged information to perform manual and automated intrusion detection and response.

    15. Create a change management plan for zero-trust initiatives.

    16. Create a communications plan for projects and initiatives related to zero trust.