Share via


CISO Workshop Module 3: Identity and Zero Trust User Access

Learn how to advance Zero Trust with your identity and user access strategy to better protect corporate data inside and outside your network perimeter.

Part 1: Identity and Zero Trust History (9:33)

Part 2: Zero Trust Definition and Models (15:37)

Part 3: Strategy and Priorities (9:54)

Part 4: Account Security: Measuring Cost of Attack Password-less Authentication (13:11)

Part 5: Zero Trust User Access Reference Architecture (8:42)

Part 6: Build an Identity Perimeter (13:57)

Part 7: Identity System Security (3:37)

Part 8: Lowering Risk using business-to-business and business-to-customer (4:47)


Additional resources

Training

Module

Describe identities in Zero Trust - Training

With the advent of cloud applications and the increase in employees working remotely, or bringing their own devices, it's critical to verify identities with strong authentication and ensure access is compliant.

Certification

Microsoft Certified: Identity and Access Administrator Associate - Certifications

Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.