Trust Security Implementation for the Hybrid
||: 2 Day
Face-to-Face Classroom and 2 Day Online
Instructor Led Workshop
workshop is delivered in two days, two units
each day between 9:15 am to 1 pm and 2:30 pm
to 5:30 pm
upon request (Write to us at email@example.com)
Office, Customer Onsite, and Online
Comprehensive Student Guide and Workshop
course can also be conducted for customers in
Lahore, and Islamabad
nut-shell, the concept of a Zero Trust
Security Architecture has been around for
more than a decade, but adoption did not
really begin to take hold until the past
couple of years. Zero Trust is a framework
for securing organizations in the cloud,
on-premises and mobile world that asserts
that no user or application should be
trusted by default. Following a key zero
trust principle, least-privileged access,
trust is established based on context (e.g.,
user identity and location, the security
posture of the endpoint, the app or service
being requested) with policy checks at each
Trust Architecture is an alternative
security model that addresses the
fundamental flaw of traditional strategies
that data only needs to be protected from
outside of an organization. The Zero Trust
model views data security through a new
lens, enabling parameters that dictate
access and restrictions.
how segmentation gateway provides granular
visibility into traffic and enforces
additional layers of inspection and access
control with granular Layer 7 policy based
on the Kipling Method.
Trust is an augmentation of your existing
architecture, it does not require a
complete technology overhaul. Rather, it
can be deployed iteratively while allowing
you to take advantage of the tools and
technologies you already have.
organizations shifted toward accelerated
digital transformation to the cloud, the
VPN became a bottleneck that was
impossible to scale. This is where the
need for having a Software Defined
Parameter (SDP) arises.
massive shift to cloud applications and
digital transformation, Cloud Access
Security Brokers emerged. CASBs aim to
mitigate risks around cloud assets when
users access those assets from inside the
BETWEEN CASB AND SASE ARCHITECTURES
SASE both offer benefits to enterprises
depending on the situation and
solution can be deployed as a standalone
framework that easily integrates into an
enterprise’s existing security
SASE is increasingly seen as the preferred
option as it builds on CASB capabilities
while simplifying security and maximizing
the efficiency of a company’s IT and
security architecture under an Hybrid
The training course flow will
be a mix of lectures & classroom
discussions so that participants can
have a detailed understanding of various
components of cybersecurity
This workshop shall
be delivered by TOGAF 9 Certified/IBM Certified
Infrastructure System Architect and an experienced
trainer with 25+ years of career experience
imparting education and training services both
locally and internationally and have worked for
international enterprise technology vendors
including IBM, Fujitsu, and ICL. Our instructor
holds various industry professional certifications
in the space of enterprise servers and storage
technologies, Information Security, Enterprise
Architecture, ITIL, Cloud, Virtualization, Green IT,
and a co-author of 10 IBM Redbooks.
successfully delivered this workshop six times in
the recent past with 100% client satisfaction
This workshop is intended for resources
- CIO, CTO, CISO, CDO, Business and
Digital Leaders, IT Director and IT Managers,
Application/Database teams, Audit, Risk and
Compliance, Information Security and
Cybersecurity Professionals, IT Operations,
Project Managers, Enterprise Architects, Network
Operation Teams, and Technical Writers with a
familiarity of basic IT/IS concepts who want to;
- Want to learn new trends in security
and data breach incidents.
- Interested in entering the field of
Information Security and Cybersecurity.
- Students and fresh graduates.
- Managers, Senior IT Managers, Business
and HR Leaders who want to refresh their present
- Security Operations Center teams.
- Network Operations Centers.
the true meaning of the Zero Trust security
- Determine how
to apply security best practices represented in
the latest Zero Trust framework to your
how to assess your existing security capabilities
and map out a plan for improving your
organization’s security practice.
security best practices for all areas of your
business (cloud, endpoint and network).
why CASB and SASE Architecture are important for
implementing Zero Trust in the Hybrid Enterprise
using Public and Private cloud services.
- Unleash the
importance for having a Software Defined WAN in
the Hybrid Enterprise environment and a comparison
between MPLS and SD-WAN technologies.
attending this workshop should be familiar with basic
Information Technology (IT) and Security concepts,
business challenges and the role of general system
wide infrastructure technologies and their
This course is
recommended for customers who have earlier attended
TLC course on "Zero Trust
Security Architecture Framework" Course Code:
TN224. For additional information on this course
click on the course link.
|Unit 1 – Zero Trust
Security Architecture Framework
that you cannot ignore – Cyber Crime
do your device know about you – An eye
and mitigate vulnerabilities in mobile
an Advanced Persistent Threats attack
Trust common IT challenges.
Zero Trust Architecture.
Segmentation Gateway – An essential
component of Zero Trust.
Trust: As Dynamic as Your Enterprise.
to achieve a Zero Trust Architecture
Trust scenarios, Zero Trust scope and
Trust architecture services – An
Governance and Administration Strategy.
Zero Trust Identity Management
Trust Implementation Methodology.
the Zero Trust Model.
do you approach Zero Trust governance?
steps to Risk Management for Zero Trust.
for starting a Zero Trust Journey.
Enterprise based on Zero Trust adoption
– A Bigger View.
Trust Architectural Framework.
Trust Maturity Levels.
are the threats to Zero Trust
Trust Best Practices.
Vs Zero Trust networks.
between SDP, VPN and Zero-Trust
of Zero Trust applied to IoT.
Zero Trust Solutions.
your response plan to prepare for
2 – User and Entity Behavior Analytics
– User and Entity Behavior Analytics
do organizations need UEBA?
UEBA works with SIEM.
integration with SIEM.
and Dissimilarities between SIEM and
for a successful implementation of UEBA
User and Entity Behavior Analytics work?
main components of UEBA.
essential pillars of UEBA.
Risk Scoring and Threat Indicator Signs.
and Entity Behavior Analytics for
Enterprise Security for threat hunting
and incident investigation.
Components of UEBA Systems.
Best Practices for building a baseline
of User Behavior.
Use case - Define Data Source, Define
Behaviors, Establish the Baseline,
Update Policies and Training wareness
Program, Conduct Testing, Rebuild
of the Disadvantages of using UEBA
solution one should know.
specifications for selecting a good UEBA
Unit 3 – The Role of
CASB and SASE in Implementing Zero Trust
Unit 4 – Exploiting
Software- Defined WAN
Management Components and Cloud
Computing Reference Architecture – CCRA.
Cloud Computing Reference Architecture.
Top 7 Advanced Cloud Security
6 Pillars of Robust Cloud Security.
Cloud Application Security Threats.
security features required for Cloud
Cloud Access Security Broker.
features offered by Cloud Access
Cloud Access Security Broker work.
of a CASB Solution.
do I need a CASB solution?
Access Security Broker Solution
key considerations for choosing a CASB.
Next-Gen CASB Architecture.
cases for Cloud Access Security
cases for Cloud Access Security
10 Best Practices for Successful CASB
Access Security Broker Vs. Secure Access
and SASE – Pros and Cons.
Access Management Defined.
to Privileged Access Management using
Zero Trust Architecture.
Enterprise based on Zero Trust
Architecture – A Bigger View.
Security Best Practices any Organization
Secure Access Service Edge (SASE).
Architecture – CASB within SASE.
and Cons of SASE & CASB– Advantages
and challenges for enterprises.
Analysis on SASE Vs. CASB.
Challenges that develop the need for
considering an SD-WAN.
business problems does SD-WAN solve?
Wide Area Network (SD-WAN) Defined.
for your SD-WAN solution.
Provisioning – An impressive capability
components that make up the basic
structure of an SD-WAN.
types of SD-WAN Architectures.
defined and difference between SD-WAN
Vs SD-WAN – Pros and Cons.
Architecture – Flexibility and
does SD-WAN work?
an effective SD-WAN security strategy at
Models for an SD-WAN Deployment.
where to deploy the SD-WAN controller.
connectivity choices for SD-WAN
and MPLS – Differentiating between the
SD-WAN Orchestration – Orchestration Vs.
benefits of SD-WAN – Highlights.