Zero Trust Networks (2nd Edition) cover art

Zero Trust Networks (2nd Edition)

Building Secure Systems in Untrusted Networks

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Zero Trust Networks (2nd Edition)

By: Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
Narrated by: Mike Chamberlain
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.

In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.

You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.

©2024 Christina Morillo and Razi Rais (P)2024 Ascent Audio
Security & Encryption Computer Security Architecture Hacking Software
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Building a Cyber Risk Management Program cover art
The DevOps Handbook, Second Edition cover art
Zero Trust Architecture cover art
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition cover art
Certified Information Security Manager CISM Study Guide cover art

What listeners say about Zero Trust Networks (2nd Edition)

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.