๐ก๏ธ
Intermediate11 hours estimated
Zero Trust Architect
Design and implement Zero Trust architectures that assume breach and verify every request. Master identity, device trust, and network segmentation at enterprise scale.
๐ 4 topic areas๐ 12 curated resources๐ 10 quiz questions
What you'll cover
1
Zero Trust Principles
Understand the three core principles: verify explicitly, use least privilege, and assume breach.
2
Identity as the New Perimeter
Build identity-centric security with Entra ID, MFA, conditional access, and Privileged Identity Management.
3
Device Trust & Endpoint Security
Ensure only healthy, compliant devices can access resources using MDM, EDR, and compliance policies.
4
Network Segmentation & Microsegmentation
Move beyond VLANs to software-defined microsegmentation that limits lateral movement.
Knowledge Check
Path Summary
- Level
- Intermediate
- Estimated time
- 11 hours
- Topics
- 4
- Resources
- 12
- Quiz questions
- 10
- Passing score
- 70% (7/10)