17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Introduction To Certificate Of Competence In Zero Trust CCZT
Language: English | Size: 826.87 MB | Duration: 2h 52m
Introduction to Certificate of Competence in Zero Trust CCZT - Planning, Strategy, Architecture, Implementation,
What you'll learn
You will be able to define Zero Trust Architecture General Concepts thus allowing your to assess the maturity of your current state.
You will be able to explain the ZTA logical model and four key implementations will give you the ability to identify components across implementations.
You will be able to review and assess ZTA planning and strategy that aligns with business requirements and allows you to select an appropriate target state..
You will be able to select specific technology tools, products, and services that will be used to implement your ZTA.
Requirements
Basic understanding of network systems and security.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction and Course Overview/1 - Build-your-own-Implementation.pdf
54 KB
~Get Your Files Here !/1 - Introduction and Course Overview/1 - CISA-Zero-Trust-Maturity-Model-Version-2-508c.pdf
1.4 MB
~Get Your Files Here !/1 - Introduction and Course Overview/1 - Helpful-Links.pdf
35.6 KB
~Get Your Files Here !/1 - Introduction and Course Overview/1 - Interactive-Spreadsheet-for-ZTMM-Student.xlsx
109 KB
~Get Your Files Here !/1 - Introduction and Course Overview/1 - Overview of Course.mp4
47.1 MB
~Get Your Files Here !/1 - Introduction and Course Overview/1 - SSTL-Inc.pdf
61.7 KB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/1 - Zero Trust and Zero Trust Architecture General Concepts and Definitions.html
92 B
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/2 - Context of ZTA.mp4
23.1 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/3 - History of ZTA.mp4
5.6 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/4 - Concepts and Definitions.mp4
10.3 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/5 - Planning Considerations.mp4
11.5 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/6 - Use Cases For ZTPart 1.mp4
11 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/7 - Use Cases For ZTPart 2.mp4
10.3 MB
~Get Your Files Here !/2 - Zero Trust and Zero Trust Architecture General Concepts and Definitions/8 - Use Cases For ZTPart 3.mp4
33.9 MB
~Get Your Files Here !/3 - Zero Trust Goals Objectives and Benefits/10 - Technical Objectives of ZT.mp4
8.5 MB
~Get Your Files Here !/3 - Zero Trust Goals Objectives and Benefits/11 - Benefits of ZT.mp4
9.2 MB
~Get Your Files Here !/3 - Zero Trust Goals Objectives and Benefits/2 - Zero Trust Goals Objectives and Benefits.html
62 B
~Get Your Files Here !/3 - Zero Trust Goals Objectives and Benefits/9 - Business Objectives of ZT.mp4
17.1 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/12 - Components of ZTA.mp4
8.1 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/13 - NIST ZTAPart 1.mp4
8.6 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/14 - NIST ZTAPart 2.mp4
6.6 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/15 - Zero Trust Network Access.mp4
5.6 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/16 - BeyondCorp.mp4
25.8 MB
~Get Your Files Here !/4 - Zero Trust Architecture Logical Model and Key Components/3 - Zero Trust Architecture Logical Model and Key Components.html
70 B
~Get Your Files Here !/5 - Software Defined Perimeter/17 - SDP History Benefits and Concepts.mp4
9.5 MB
~Get Your Files Here !/5 - Software Defined Perimeter/18 - SDP Core Tenets Underlying Technologies and Architecture.mp4
9.6 MB
~Get Your Files Here !/5 - Software Defined Perimeter/19 - SDP Onboarding and Workflow.mp4
10 MB
~Get Your Files Here !/5 - Software Defined Perimeter/20 - SDP Deployment Models.mp4
9.1 MB
~Get Your Files Here !/5 - Software Defined Perimeter/4 - Software Defined Perimeter.html
40 B
~Get Your Files Here !/6 - Zero Trust Planning/21 - Assumptions and Initial Considerations.mp4
11.9 MB
~Get Your Files Here !/6 - Zero Trust Planning/22 - Planning Considerations Part 1.mp4
18.3 MB
~Get Your Files Here !/6 - Zero Trust Planning/23 - Planning Considerations Part 2.mp4
18.1 MB
~Get Your Files Here !/6 - Zero Trust Planning/24 - Scope Priority and Business Case.mp4
8.3 MB
~Get Your Files Here !/6 - Zero Trust Planning/25 - Gap Analysis.mp4
7.3 MB
~Get Your Files Here !/6 - Zero Trust Planning/26 - Define Protect and Attack Surfaces.mp4
17.2 MB
~Get Your Files Here !/6 - Zero Trust Planning/27 - Map Transactions Flows.mp4
12.6 MB
~Get Your Files Here !/6 - Zero Trust Planning/28 - Developing a Target Architecture.mp4
27.2 MB
~Get Your Files Here !/6 - Zero Trust Planning/29 - Define Policies for ZT and Monitoring.mp4
21.3 MB
~Get Your Files Here !/6 - Zero Trust Planning/5 - Zero Trust Planning.html
33 B
~Get Your Files Here !/7 - Zero Trust Strategy/30 - Strategy Levels.mp4
22.3 MB
~Get Your Files Here !/7 - Zero Trust Strategy/31 - Drivers and Buyin.mp4
9.8 MB
~Get Your Files Here !/7 - Zero Trust Strategy/32 - Tactics.mp4
14.6 MB
~Get Your Files Here !/7 - Zero Trust Strategy/33 - Operations.mp4
10.9 MB
~Get Your Files Here !/8 - Zero Trust Implementation/34 - Training and Project Implementation.mp4
12.9 MB
~Get Your Files Here !/8 - Zero Trust Implementation/35 - Implementation Preparation Activities.mp4
23.5 MB
~Get Your Files Here !/8 - Zero Trust Implementation/36 - Target Implementation by Pillar.mp4
30.4 MB
~Get Your Files Here !/8 - Zero Trust Implementation/37 - Crosscutting Target Implementation.mp4
36 MB
~Get Your Files Here !/8 - Zero Trust Implementation/7 - Zero Trust Implementation.html
39 B
~Get Your Files Here !/9 - Conclusion/38 - Next Steps and Exam Prep.mp4
58.7 MB
~Get Your Files Here !/9 - Conclusion/39 - George Finney ZT Interview.mp4