- Type Learning
- Level Intermediate
- Cost Paid
Protecting Data Using Zero Trust Certificate
Issued by
ISC2
Earners of the Protecting Data Using Zero Trust Certificate have demonstrated a solid understanding of the essentials of zero trust. They have foundational to intermediate knowledge of zero trust models and the integration of identity-centric access controls, least privilege, micro-segmentation, assessments and continuous monitoring in zero trust networking architecture and security.
- Type Learning
- Level Intermediate
- Cost Paid
Skills
Earning Criteria
-
Complete the learning requirements of the three courses included in the Protecting Data Using Zero Trust Certificate: Defining the Boundaries of Zero Trust Vulnerability Management in Zero Trust Continuous Monitoring and Incident Response for Zero Trust
-
Pass the Protecting Data Using Zero Trust Certificate assessment.