Zero Trust Network Access

Zero Trust Network Access (ZTNA) is a security model that mandates no implicit trust between systems, regardless of their location within an enterprise's network infrastructure. Coursera's ZTNA catalogue teaches you how to effectively implement this contemporary security model. You'll learn to understand the principles of 'never trust, always verify' and 'least privilege access' which are vital for effective ZTNA implementation. You will also learn to design and implement ZTNA in different network architectures and explore the role of identity and access management, micro-segmentation, and multi-factor authentication within the model. Sharpen your cybersecurity skills by mastering the operations of ZTNA to protect your organization's network from external and internal threats.
9credentials
25courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "zero trust network access"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Wireless Networks, Emerging Technologies, Digital Communications, Internet Of Things, Software-Defined Networking, Network Planning And Design, Distributed Computing, Artificial Intelligence and Machine Learning (AI/ML), Electrical Engineering, Electronics Engineering, Zero Trust Network Access, Information Technology, Machine Learning, Trustworthiness

  • Status: New
    Status: Preview

    Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)

  • Status: New
    Status: Preview

    Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines

  • Status: New
    Status: Free Trial

    Skills you'll gain: Emerging Technologies, Generative AI, Communication Systems, Internet Of Things, Software-Defined Networking, Digital Communications, Network Architecture, Zero Trust Network Access, Artificial Intelligence and Machine Learning (AI/ML), Distributed Computing, Deep Learning, Artificial Intelligence, Information Technology, Health Technology, Electronics Engineering, Electrical Engineering, Machine Learning, Trustworthiness

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management

  • Status: Free Trial

    Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service

  • Status: New
    Status: Free Trial

    Skills you'll gain: Wireless Networks, Emerging Technologies, Communication Systems, Digital Communications, Internet Of Things, Augmented and Virtual Reality (AR/VR), Telecommunications, Network Architecture, Software-Defined Networking, Zero Trust Network Access, Interoperability, Electronics Engineering, Network Planning And Design, Distributed Computing, Development Testing, Electrical Engineering, Artificial Intelligence and Machine Learning (AI/ML), Information Technology, Machine Learning, Trustworthiness

  • Status: New
    Status: Free Trial

    Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Information Systems Security, IT Security Architecture

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence

  • Skills you'll gain: Google App Engine, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Identity and Access Management, Data Access, Network Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Microsoft Azure, Zero Trust Network Access, Disaster Recovery, Data Migration, Cloud Computing Architecture, Network Security, Network Architecture, Cloud Solutions, Infrastructure As A Service (IaaS), Cloud Security, Cloud Services, Firewall, General Networking, Virtual Private Networks (VPN), Platform As A Service (PaaS), Scalability

  • Status: New

    Skills you'll gain: Identity and Access Management, Cloud Services, Microsoft Azure, Microsoft Teams, Collaborative Software, Security Controls, Endpoint Security, Cloud Solutions, Zero Trust Network Access, Microsoft Office, Cloud Computing, Information Privacy