Zero Trust Network Access

Zero Trust Network Access (ZTNA) is a security model that mandates no implicit trust between systems, regardless of their location within an enterprise's network infrastructure. Coursera's ZTNA catalogue teaches you how to effectively implement this contemporary security model. You'll learn to understand the principles of 'never trust, always verify' and 'least privilege access' which are vital for effective ZTNA implementation. You will also learn to design and implement ZTNA in different network architectures and explore the role of identity and access management, micro-segmentation, and multi-factor authentication within the model. Sharpen your cybersecurity skills by mastering the operations of ZTNA to protect your organization's network from external and internal threats.
9credentials
25courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "zero trust network access"

  • Status: Free Trial

    Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Computing, Zero Trust Network Access, Business Continuity, Continuous Monitoring, Cloud Infrastructure, Hybrid Cloud Computing, Cloud Platforms, Cloud Services, Data Migration, Resource Allocation, Security Requirements Analysis, Data Management, Public Cloud, Disaster Recovery, Infrastructure As A Service (IaaS), Risk Mitigation, Virtualization, Security Strategy

  • Status: New
    Status: Free Trial

    Skills you'll gain: Wireless Networks, Emerging Technologies, Digital Communications, Internet Of Things, Software-Defined Networking, Network Planning And Design, Distributed Computing, Artificial Intelligence and Machine Learning (AI/ML), Electrical Engineering, Electronics Engineering, Zero Trust Network Access, Information Technology, Machine Learning, Trustworthiness

  • Status: New
    Status: Free Trial

    Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Identity and Access Management, User Provisioning, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring

  • Status: New
    Status: Free Trial

    Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption

  • Status: New
    Status: Free Trial

    Skills you'll gain: Wireless Networks, Emerging Technologies, Communication Systems, Digital Communications, Internet Of Things, Augmented and Virtual Reality (AR/VR), Telecommunications, Network Architecture, Software-Defined Networking, Zero Trust Network Access, Interoperability, Electronics Engineering, Network Planning And Design, Distributed Computing, Development Testing, Electrical Engineering, Artificial Intelligence and Machine Learning (AI/ML), Information Technology, Machine Learning, Trustworthiness

  • Status: New
    Status: Free Trial

    Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Synapse Analytics, Azure Active Directory, Real Time Data, Zero Trust Network Access, Serverless Computing, Identity and Access Management, Data Integration, Cloud Applications, Virtual Machines, Cloud Computing Architecture, Data Governance, Data Management, Cloud Security, Cloud Storage, Cloud Computing, Solution Architecture, Disaster Recovery, Data Migration

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)

  • Status: New

    Skills you'll gain: Identity and Access Management, Cloud Services, Microsoft Azure, Microsoft Teams, Collaborative Software, Security Controls, Endpoint Security, Cloud Solutions, Zero Trust Network Access, Microsoft Office, Cloud Computing, Information Privacy

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Security Controls, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments

  • Status: New
    Status: Free Trial

    Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Continuous Monitoring, IT Security Architecture

  • Status: Free Trial

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity