1. Introduction to Enterprise Security
  2. Get to Know Zero Trust
  3. Architectures With Zero Trust
  4. Zero Trust in Practice
  5. Identity and Access Management (IAM)
  6. Network Infrastructure
  7. Network Access Control
  8. Intrusion Detection and Prevention Systems
  9. Virtual Private Networks
  10. Next-Generation Firewalls
  11. Security Operations
  12. Privileged Access Management (PAM)
  13. Data Protection
  14. Infrastructure and Platform as a Service
  15. 15.Software as a Service (SaaS)
  16. IoT Devices
  17. A Policy of Zero Trust
  18. Zero Trust Scenarios
  19. Creating a Successful Zero Trust Environment