Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Zero Trust Architectures

Edureka via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This program equips cybersecurity professionals, security architects, network engineers, and system administrators with the skills to design and implement Zero Trust security architectures in modern enterprise environments. You will explore the limitations of traditional security models, understand implicit trust risks, and learn how Zero Trust principles such as continuous verification and least privilege prevent lateral movement. The course covers NIST-based architecture, identity-driven access controls (MFA, RBAC, ABAC), segmentation, and Zero Trust Network Access (ZTNA), along with monitoring and policy enforcement strategies. You will apply these concepts in a practical project to design architecture, implement controls, and develop a phased Zero Trust roadmap aligned with enterprise and compliance requirements. By the end of this program, you will be able to: - Analyze implicit trust risks and identify lateral movement pathways in enterprise environments - Design Zero Trust architectures using NIST-aligned components and deployment models - Implement identity-driven access controls including MFA, RBAC, ABAC, and conditional access - Apply microsegmentation and Zero Trust Network Access to reduce attack surface - Enable continuous monitoring and adaptive policy enforcement using real-time signals - Align Zero Trust implementations with compliance frameworks and governance requirements - Develop phased Zero Trust implementation roadmaps based on risk and business priorities This course is designed for cybersecurity professionals, security architects, network engineers, system administrators, and IT practitioners seeking to build expertise in modern security architecture and Zero Trust implementation. Join us to develop the architectural thinking, technical depth, and strategic approach required to design secure, scalable, and resilient enterprise systems using Zero Trust principles.

Syllabus

  • Foundations of Zero Trust Security
    • Build a strong foundation in Zero Trust by understanding the limits of traditional security and the risks of implicit trust. Learn how attackers exploit internal access and why continuous verification and identity-based security are essential.
  • Zero Trust Architecture
    • Develop skills in designing Zero Trust architectures using NIST-aligned components and trust enforcement models. Learn how Policy Engine, Policy Administrator, and Enforcement Points manage access decisions across systems.
  • Core Pillars and Implementing Zero Trust Controls
    • Gain hands-on experience implementing Zero Trust across identity, devices, networks, and data. Design identity-driven security using access controls and verification methods.
  • Governance, Compliance, and Real-World Application
    • Establish practical expertise in implementing Zero Trust across identity, devices, networks, and data to enable continuous verification and reduce risk. Design identity-driven security using advanced access controls and verification methods.
  • Course Wrap-Up and Assessment
    • Advance your expertise in implementing Zero Trust across identity, devices, networks, and data to enable continuous verification and reduce risk. Design identity-driven security using advanced access controls and verification methods.

Taught by

Edureka

Reviews

Start your review of Zero Trust Architectures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.