||: Zero Trust Security Architecture
||: 2 Day Online Intructor Led Workshop
: Online workshop is delivered
in two days, two units each day between 10:30 am to 1 pm and 3 pm to 5:30
||: Available upon request (Write
to us at
||: TLC Office, Customer Onsite, and
||: Comprehensive Student Guide and
This on-site couse can also be conducted
for customers in Lahore, and Islamabad
Zero Trust has become an extremely
popular reference for security best practices. Vendor marketing and other
misleading data has unfortunately caused confusion about what Zero Trust
is and how to use it properly. This misunderstanding of Zero Trust can
lead to a false sense of security.
This course will review the history
of many popular terms for security best practices as well as how the industry
developed the term Zero Trust. We will review Zero Trust Architecture and
Framework in details with enterprise use cases. Topics will include network,
endpoint and cloud security concepts. We will also discuss misconceptions,
such as how Zero Trust best practices can’t be achieved by simply acquiring
a technology such as a Firewall, Identity Management solution or Network
Access Control offering. Expect many real-world examples, demos and definitions
of topics that you can relate to as well as evaluate with open source or
course flow will be a mix of lectures & classroom discussions so that
participants can have a detailed understanding of various components of
ABOUT THE INSTRUCTOR
This workshop shall be delivered
by TOGAF 9 Certified/IBM Certfied Infrastructure System Architect and an
experienced trainer with 25+ years of career experience imparting education
and training services both locally and internationally and have worked
for international enterprise technology vendors including IBM, Fujitsu,
and ICL. Our instructor holds various industry professional certifications
in the space of enterprise servers and storage technologies, Information
Security, Enterprise Architecture, ITIL, Cloud, Virtualization, Green IT,
and a co-author of 10 IBM Redbooks.
is intended for resources who/from:
CIO, CTO, CISO,
Business Leaders, IT Director and IT managers, Application/Database teams,
Audit, Risk and Compliance, Information Security and Cybersecurity Professionals,
IT Operations, Project Managers, Enterprise Architects, Network Operation
Teams, and Legal professionals with a familiarity of basic IT/IS concepts
who want to;
Want to learn
new trends in security and data breach incidents.
entering the field of Information Security and Cybersecurity.
Students and fresh
IT Managers, Business and HR Leaders who want to refresh thier present
Understand the true meaning of the Zero
Trust security framework
Determine how to apply security best
practices represented in the latest Zero Trust framework to your organization.
Understand how to assess your existing
security capabilities and map out a plan for improving your organization’s
Understand security best practices for
all areas of your business (cloud, endpoint and network)
A lab exercise based on tracing a Malware
in endpoint devices.
Participants attending this workshop
should be familiar with basic Information Technology (IT) and Security
concepts, business challenges and the role of general system wide infrastructure
technologies and their applications.
|Unit 1 – Unified Threat Management
Unit 2 – Advanced Network Thread
Threats and security challenges faced
Why do we need to make cybersecurity
Threat hunting and indicators of compromise
Understand threat management and knowing
security threats and their channels.
Threat management and threat hunting
Explaining categories of Risks.
Understand Threat Modeling and procedure
how to perform threat modeling exercise.
Threat Hunting Methodologies and key
Fileless Malware Attack Process and
Describe Threat hunting Maturity Model.
Understand Unified Threat Management.
Understand how Unified Threat Management
Unified Threat Management vs. Next-Generation
UTM –Advantages and Disadvantages.
Best practices for a modern threat management
Exploring UTM Managed Cloud Services
UTM Performance and Throughput.
Unit 1 Assessment
Understand Zero-day Attack.
The critical issue with Zero-day vulnerability.
Suggestions for Mitigating the effects
of a Zero-day attack.
Describe Advanced Network Threat Prevention.
Issues addressed by Advanced Network
Describe Digital Signatures and their
Signatureless Malware Deduction technology.
Attack Vector, Attack Surface &
How Does Advanced Network Threat Prevention
Understand Advanced Network Threat Prevention
Understand malware features like whitelisting,
blacklisting, security services provided by third parties, sandboxing,
honeypots, honeynets and anti-malware.
Understand Penetration Testing.
MITRE ATT&CK framework, benefits,
challenges and Tactics and Techniques use by MITRE ATT&CK.
The role of Read Team and Blue Team.
Unit 2 Assessment.
|Unit 3 – Exploiting Network Threat
Detection and Prevention Tools
Unit 4 – Zero Trust Architecture
Evaluate the effectiveness of your IDS
and IPS systems.
Firewall and Network-based IPS/IDS &
IPS Capacity Planning.
Best practices for deploying an IPS
in your enterprise.
A features Comparison Matrix –Firewall
Vs IDS Vs IPS.
Critical issue with Zero-day vulnerability.
Understand SIEM and log management.
How to select a right SIEM tools for
Differentiating Continuous and Egress
Understand Network Access Control.
Secure network components –NAC devices.
Best practices to implement Network
Industry Use Cases for Network Access
The path to next-generation secure network
Vulnerabilities in mobile systems –MDM
Unit 3 Assessment
Understanding Zero Trust Architecture.
Describe Segmentation Gateway.
Deploying Zero Trust and Zero Trust
Zero Trust scope and phases.
Zero Trust architecture services –An
Implementing Zero Trust Identity Management
Zero Trust Implementation Methodology.
How do you approach Zero Trust governance?
Key steps to Risk Management for Zero
Recommendations for starting a Zero
Digital Enterprise based on Zero Trust
Zero Trust Architectural Framework.
Zero Trust Best Practices.
VPN Vs Zero Trust networks.
Difference between SDP, VPN and Zero-Trust
Unit 4 Assessment.