RiseUpp Logo
Educator Logo

Zero Trust Architecture: Fundamentals and Implementation

Learn essential principles and practical applications of Zero Trust security architecture using open-source tools like SPIFFE and SPIRE.

Learn essential principles and practical applications of Zero Trust security architecture using open-source tools like SPIFFE and SPIRE.

This comprehensive course explores Zero Trust Architecture fundamentals, designed for professionals working with microservice-based systems. Students learn to implement Zero Trust principles using open-source tools like SPIFFE/SPIRE, Open Policy Agent, and Istio service mesh. The course covers trust models, workload identities, and practical applications in modern cloud environments. Through hands-on practice, participants gain skills in deploying Zero Trust solutions while understanding the underlying security concepts and their importance in today's evolving threat landscape.

English

English

Powered by

Provider Logo
Zero Trust Architecture: Fundamentals and Implementation

This course includes

7 Weeks

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

12,669

Audit For Free

What you'll learn

  • Master the fundamentals of Zero Trust security architecture

  • Understand cryptography and trust models in cloud environments

  • Implement Zero Trust practices using open-source tools

  • Analyze security challenges in microservice-based systems

  • Deploy workload identity management solutions

  • Apply Zero Trust principles in real-world scenarios

Skills you'll gain

Zero Trust Security
Network Security
Cloud Computing
Microservices
Cryptography
SPIFFE
SPIRE
Kubernetes

This course includes:

PreRecorded video

Graded assignments, exams

Access on Mobile, Tablet, Desktop

Limited Access access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Provided by

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 5 modules in this course

This course provides a thorough understanding of Zero Trust Architecture and its implementation in modern network environments. The curriculum covers key concepts including perimeter-based security limitations, cryptography fundamentals, trust models, and workload identity management. Students gain practical experience with industry-standard open-source tools while learning to address contemporary security challenges in microservice-based architectures.

Welcome to LFS183x

Module 1

Zero Trust Fundamentals

Module 2

Why Do We Care about Zero Trust

Module 3

Technology Fundamentals: Cryptography and Trust

Module 4

Technology Fundamentals: Cryptography and Trust

Module 5

Fee Structure

Instructors

Cloud Native Security Expert Advancing Threat-Driven Designs

Torin van den Bulk is a Cloud Native Security Engineer at ControlPlane, specializing in threat-driven designs for cloud native environments. With a Bachelor of Science in Cybersecurity and a Master's degree in Computer and Information Technology from Purdue University, van den Bulk brings a strong academic foundation to his work, particularly in advanced network penetration testing and cloud security research. His diverse professional background spans full-stack development and threat and vulnerability management, which he leverages to contribute to open source projects. Van den Bulk has made significant contributions to the field, including presenting at major conferences like KubeCon North America and ArgoCon. He co-authored a talk on "Threat Model Report: Security Considerations for Hardening Declarative GitOps on K8s with Argo CD," demonstrating his expertise in Kubernetes security. At the Secure AI Summit, van den Bulk delivered an insightful presentation on the "Invisible infiltration of AI supply chains by adversarial actors," highlighting the importance of securing AI supply chains. His work at ControlPlane involves developing innovative security solutions for cloud native technologies, with a focus on enhancing operational theory and security practices in Kubernetes environments. Van den Bulk's expertise extends to Zero Trust principles and multi-cloud security, as evidenced by his involvement in industry discussions and workshops on these topics.

Cloud Native Security Expert Bridging Physics and Cybersecurity

Dr. James Callaghan is a Principal Consultant at ControlPlane, bringing a unique perspective to cloud native security through his background as a theoretical physicist. His journey into cybersecurity began when his coding experiences during physics research revealed the prevalence of vulnerabilities in software systems. After transitioning to cybersecurity, Dr. Callaghan spent several years as a Security Architect for UK Government clients, where he specialized in secure Public Cloud architectures. At ControlPlane, he works with clients in highly regulated environments, focusing on container security and cloud native technologies. He is an active contributor to the cloud native community, presenting at major conferences like KubeCon and developing threat models for critical infrastructure. Dr. Callaghan is also an educator, authoring courses for the Linux Foundation on zero trust principles and providing training through O'Reilly. His expertise spans Kubernetes security, threat modeling, and secure architecture design, particularly in helping organizations protect their systems against modern cyber threats. He frequently shares his knowledge through conference presentations and workshops, including recent talks on Envoy Gateway security and GitOps hardening with Argo CD.

Zero Trust Architecture: Fundamentals and Implementation

This course includes

7 Weeks

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

12,669

Audit For Free

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.