Course Outline


  • Zero Trust vs traditional perimeter security

Overview of BeyondCorp Architecture and Design Principles

Understanding Network Segmentation

Implementing a Perimeterless Design

Knowing Users and their Devices

Authenticating and Authorizing Users

Data Encryption

Maintaining Productivity While Improving Security

The User Experience


Summary and Conclusion


  • An understanding of networking concepts
  • An understanding of enterprise security
 14 Hours

Number of participants

Price per participant

Testimonials (5)

Related Categories