Training > Cybersecurity > Introduction to Zero Trust (LFS183)
Training Course

Introduction to Zero Trust (LFS183)

Learn the fundamentals of Zero Trust and how open source tools such as SPIFFE and SPIRE can be used to deploy Zero Trust in your architecture.

Who Is It For

This course is designed for developers, operators, security professionals, and architects working on medium to large microservice-based systems, as well as IT leaders and policy decision-makers looking to enhance security within their organization.
read less read more
What You’ll Learn

This course discusses the features and characteristics of a Zero Trust Architecture, the different models of trust and use cases, and provides opportunities for hands-on practice with open source tools such as SPIFFE/SPIRE, Open Policy Agent, and Istio service mesh.
read less read more
What It Prepares You For

You will be equipped with the tools and insights to navigate the increasingly significant landscape of Zero Trust Networks, helping prepare you to apply them in real-world scenarios.
read less read more
Course Outline
Welcome!
Zero Trust Fundamentals
Why Should We Care about Zero Trust
Technology Fundamentals: Cryptography and Trust
Managing Trust in the Cloud

Prerequisites
  • Practical experience with cloud computing and Infrastructure-as-Service (IaaC)
  • Experience with deploying and operating container orchestration platforms based on Kubernetes is a plus
  • Access to a device or virtual machine running a Linux operating system. Lab exercises have been tested on Ubuntu 22.04
Reviews
Sep 2024
The labs were really good additions. Many real roles are easier than the labs, and that is a good thing. The labs were really good. Not having a virtual learning space requires some technical knowledge, this adds to the experience in an advanced and positive way.
Jun 2024
The in-depth explanation of Zero Trust principles, and the practical labs that allowed for hands-on experience, were the highlights of the course.
Mar 2024
A lot of interesting material, that brings with it new knowledge on the zero trust subject.
Jan 2024
Lots of information that was condensed into essential points.
Jan 2024
It explained the zero trust and perimeter architectures well, without the need to read long NIST documents.