Zero Trust Network Access

Zero Trust Network Access (ZTNA) is a security model that mandates no implicit trust between systems, regardless of their location within an enterprise's network infrastructure. Coursera's ZTNA catalogue teaches you how to effectively implement this contemporary security model. You'll learn to understand the principles of 'never trust, always verify' and 'least privilege access' which are vital for effective ZTNA implementation. You will also learn to design and implement ZTNA in different network architectures and explore the role of identity and access management, micro-segmentation, and multi-factor authentication within the model. Sharpen your cybersecurity skills by mastering the operations of ZTNA to protect your organization's network from external and internal threats.
9credentials
25courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "zero trust network access"

  • Status: New
    Status: Free Trial

    Skills you'll gain: VMware ESX Servers, Hybrid Cloud Computing, Software-Defined Networking, Zero Trust Network Access, Virtualization, Data Centers, Role-Based Access Control (RBAC), Virtual Local Area Network (VLAN), Virtual Machines, Cloud Management, Network Switches, Cloud Infrastructure, Virtualization and Virtual Machines, Network Architecture, IT Infrastructure, Performance Tuning, IT Automation, Cloud Computing, Network Infrastructure, Network Routing

  • Status: New

    Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Software-Defined Networking, Zero Trust Network Access, Virtual Local Area Network (VLAN), Network Switches, Network Architecture, Network Routing, Network Security, Load Balancing, Firewall, Virtualization, Network Protocols, System Configuration, Multi-Tenant Cloud Environments, Scalability

  • Status: New
    Status: Free Trial

    Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations

  • Status: New
    Status: Free Trial

    University of Glasgow

    Skills you'll gain: Wireless Networks, Emerging Technologies, Digital Communications, Blockchain, Internet Of Things, Generative AI, Communication Systems, Network Security, Telecommunications, Network Performance Management, Network Planning And Design, Zero Trust Network Access, Computer Vision, Artificial Intelligence and Machine Learning (AI/ML), Electrical Engineering, Network Analysis, Information Technology, Electronics Engineering, Machine Learning, Trustworthiness

  • Status: New
    Status: Free Trial

    Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Identity and Access Management, User Provisioning, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring

What brings you to Coursera today?

  • Status: New

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Detection, Cryptography, Data Security, Continuous Monitoring, Security Management, Compliance Management, Zero Trust Network Access, Information Assurance, Vulnerability Management, Governance Risk Management and Compliance, Data Encryption Standard, Blockchain, Data Integrity

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence

  • Status: New
    Status: Preview

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines