Security documentation

Technical guidance to help security professionals build and implement cybersecurity strategy, architecture, and prioritized roadmaps. Read documentation, how-to guides, or browse certifications and trainings.

Security job roles

Learning resources and certifications for security roles

Adopt a Zero Trust architecture

Learn about the Zero Trust security model, its principles, and how to implement a Zero Trust architecture

Adoption framework

Get help driving strategy and implementation across your organization

Modernize Security Operations (SecOps/SOC)

Defend against threats by rapidly detecting, responding, and recovering from attacks

Secure access and identities

Configure and manage authentication and authorization of identities for users, devices, resources, and applications

Protect and govern data

Protect data and safeguard sensitive information across platforms, applications, and clouds