课程大纲:
BeyondCorp: Implementing Zero Trust Security培训
Introduction
Zero Trust vs traditional perimeter security
Overview of BeyondCorp Architecture and Design Principles
Understanding Network Segmentation
Implementing a Perimeterless Design
Knowing Users and their Devices
Authenticating and Authorizing Users
Data Encryption
Maintaining Productivity While Improving Security
The User Experience
Troubleshooting
Summary and Conclusion