Establish the guiding principles and core components of Zero Trust

Microsoft 365

Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.



Modules in this learning path

In recent years, the Zero Trust concept has emerged as a go-to security solution for organizations big or small. The Zero Trust approach is a combination of modern technologies and best practices that strengthens the security infrastructure within your organization.

With the advent of cloud applications and the increase in employees working remotely, or bringing their own devices, it's critical to verify identities with strong authentication and ensure access is compliant.

Learn how to use Zero Trust to secure endpoints to protect your organization and its users.

Learn how to use Zero Trust to secure your applications and to protect your organization and its users.

Networks enable us to communicate with everyone, from sharing pictures and video chats to online shopping and banking. Protecting your network from cybercriminals can be demanding as many of us move to hybrid working. A Zero Trust strategy will help to keep your networks safe and your data secure.

Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.

Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.