Secure endpoints with Zero Trust
Learn how to use Zero Trust to secure endpoints to protect your organization and its users.
Learning objectives
By the end of this module, you'll be able to:
- Describe endpoints.
- Describe attack surface.
- Describe how to protect endpoints using the Zero Trust approach.
Prerequisites
- None