The Zero Trust Certification Journey
Zero Trust Certification is delivered through a cohort-based course. Courses cover 6 competency-based lessons that average between 1-3 hours a week over an 8 week period. Course participants may also be able to claim continuing professional education (CPE) credit with (ISC)2 for the hours spent working toward certification.
2 tracks support different roles, although both tracks cover the same course content.
- Strategists represent your core information security team and provide recognition for experience and expertise. The Strategist certification requires 3 years of direct cybersecurity work experience. Strategist certification requires additional course content.
- Associates support Zero Trust execution through cross-functional alignment and shared understanding of concepts. Staff new to security management, or fields that collaborate closely with the organization’s cybersecurity team benefit from Associate certification.
Zero Trust Certification For Individuals
Maximize opportunities to discuss key topic threads in a dynamic, peer learning environment.
Specific start dates
Begin an 8-week course at designated start dates to gain insights and increase your impact.
Fit certification into busy schedules with mobile-friendly lessons to do anytime, anywhere.
Zero Trust Certification For Teams
Zero Trust is a cross-functional effort for any organization. It requires a thoughtful strategy and buy-in from leaders and their teams. As such, all cybersecurity team members must align around common vocabulary, mindset, and approach. Teams of 20 or more are invited to explore customization options:
- Enroll in a private course with a start date of your choosing
- Tailor course discussions to your unique organizational situation
- Add optional 1:1 feedback sessions with expert analysts
Level I: Zero Trust Strategy
Arm yourself with the knowledge and skills required to adopt Zero Trust at your organization. Create the business case for Zero Trust and learn how to build alignment around a common imperative, terminology, and set of tools to mobilize lasting change.
Topics covered in Zero Trust Strategy
The Zero Trust eXtended Framework
Understand Zero Trust as a holistic approach that includes people, processes, and technologies.
Five Steps To A Zero Trust Network
Quickly begin and iterate on a five-step journey to realize the benefits of a Zero Trust strategy.
The Business Case For Zero Trust
Put Zero Trust in the context of your ultimate goal: protecting data and empowering the organization.
Supporting Zero Trust
Learn how to support Zero Trust across your organization by involving GRC, IR, the SOC, and your organization’s “human firewall.”
Use key risk and performance indicators to build momentum and drive change.
Maturing Zero Trust
Identify policy and process changes to continuously improve and advance your Zero Trust maturity.
Meet Your Guides
Learn from expert analysts who bring unique experiences, examples and advice to share on cybersecurity best practices.
In order to adopt Zero Trust, you need to map out your data flows and identify how employees, customers, and applications access data across your organization, regardless of department ownership.
—Chase Cunningham, Forrester Principal Analyst
Complimentary Two Week Trial Of Zero Trust Strategy’s Five Steps to Zero Trust Lesson
Thank you for your interest in our Zero Trust Strategy course. You can now access your Zero Trust Strategy course demo on your mobile phone, tablet, or desktop. We will be in touch with more information about our Zero Trust Strategy course and to answer any questions that you may have.