Course

Zero Trust Architecture

Hands holding padlock with key in
As organizations face increasingly sophisticated cyber threats, the traditional perimeter-based security model is no longer sufficient. Zero Trust Architecture (ZTA) has emerged as a modern approach to safeguarding systems, data, and users by enforcing the principle of "never trust, always verify“.

About the course

This course provides a comprehensive introduction to Zero Trust concepts and practices. The participants will learn how to design and implement Zero Trust in real-world environments, ensuring that access is strictly controlled, identities are verified, and sensitive data is protected. The training aims to equip you with the mindset and tools necessary to build resilient systems that can withstand today’s evolving threat landscape.

Contents

  • Understand the core principles and philosophy of Zero Trust
  • Learn how to move from a perimeter-based to a Zero Trust security model
  • Explore identity and access management as the foundation of Zero Trust
  • Gain insights into network segmentation, micro segmentation, and continuous monitoring
  • Examine practical examples of Zero Trust implementation in cloud, hybrid, and on-premises environments
  • Explore key technologies enabling Zero Trust (MFA, conditional access, SIEM, EDR, etc.)
  • Understand regulatory and compliance drivers that make Zero Trust a business requirement

Target audience

This course is ideal for IT architects, security specialists, system administrators, and decision-makers who want to modernize their organization’s security posture. It is also valuable for developers and infrastructure engineers seeking to understand how Zero Trust principles impact system design and day-to-day operations.

Duration

Two days

Course type

Customized course for closed groups. Can be conducted on-site or online

 

Contact 

Leave your contact info and we will be in touch

Fields marked with an asterisk (*) are required.
Privacy Policy

Further questions? Contact me directly! 


Woman with a ponytail, wearing a blue blouse and black cardigan, looking calmly at the camera.

Charlotte Magnusson

Head of Education

charlotte.magnusson@consid.se

+46 72-368 73 36

More courses on IT security 

Hands holding padlock with key in

Course | 2025-11-10

Zero Trust Architecture

Zero Trust Architecture
Colleagues working together, using pink Post-it notes.

Course | 2025-06-03

LEAN through LEAN-games

LEAN through LEAN-games

Course | 2025-04-28

Employer Branding - A lecture

Employer Branding - A lecture
A lightbulb in the foreground in front of a laptop in the background, both painted in beige, white and pink nuances.

Course | 2024-10-16

Sitevision web analytics with Piwik Pro

Sitevision web analytics with Piwik Pro