Emerging Threats & Zero Trust Architecture

Emerging Threats & Zero Trust Architecture

Learn about emerging threats to data security operations, security use cases, and why zero trust architecture is critical to securing the enterprise.

rate limit

Code not recognized.

About this Course

In the recent past, perimeter or location-based data security models were good enough. But in a time of rapid technology transformation across applications and cloud infrastructures, new security models are needed to confront ever-evolving security challenges that can hobble or even destroy an organization's business practices, revenues, or reputations.

This course offers an overview of the emerging threats to data security operations and architectures, starting with the current technology security landscape and the common terms you need to know.  Following that are some emerging threat security use cases, designed to provide details on key technical challenges faced in different business verticals. The key takeaway is why establishing a zero trust architecture is critical to securing the enterprise.

This is the first course in a series on Zero Trust & Data Security. 

What's Covered

  • Emerging Threats: The Basics
  • Threats to On-prem, Hybrid, or Cloud Businesses
  • Meeting Threats with Zero Trust
  • Quiz

 

Curriculum28 min

  • Emerging Threats: The Basics 9 min
  • Threats to On-prem, Hybrid, or Cloud Businesses 8 min
  • Meeting Threats with Zero Trust 11 min
  • Quiz
  • Course Materials
  • Security Glossary
  • What's Next
  • Intro to SPIFFE & SPIRE

About this Course

In the recent past, perimeter or location-based data security models were good enough. But in a time of rapid technology transformation across applications and cloud infrastructures, new security models are needed to confront ever-evolving security challenges that can hobble or even destroy an organization's business practices, revenues, or reputations.

This course offers an overview of the emerging threats to data security operations and architectures, starting with the current technology security landscape and the common terms you need to know.  Following that are some emerging threat security use cases, designed to provide details on key technical challenges faced in different business verticals. The key takeaway is why establishing a zero trust architecture is critical to securing the enterprise.

This is the first course in a series on Zero Trust & Data Security. 

What's Covered

  • Emerging Threats: The Basics
  • Threats to On-prem, Hybrid, or Cloud Businesses
  • Meeting Threats with Zero Trust
  • Quiz

 

Curriculum28 min

  • Emerging Threats: The Basics 9 min
  • Threats to On-prem, Hybrid, or Cloud Businesses 8 min
  • Meeting Threats with Zero Trust 11 min
  • Quiz
  • Course Materials
  • Security Glossary
  • What's Next
  • Intro to SPIFFE & SPIRE

For more information on how HPE manages, uses and protects your information please refer to HPE Privacy Statement. You can always withdraw or modify your consent to receive marketing communication from HPE. This can be done by using the opt-out and preference mechanism at the bottom of our email marketing communication or by following this link.

×