Author: Adarsh Kant
Publisher: Orange Education Pvt Ltd
ISBN: 8197223866
Category : Computers
Languages : en
Pages : 316
Book Description
"Level Up Your Security Skills with Linux Expertise!" Key Features ● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats. ● Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies. ● Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security. Book Description The Ultimate Linux Network Security for Enterprises is your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems. The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role. From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets. What you will learn ● Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses. ● Develop and deploy resilient security incident response plans. ● Configure and oversee sophisticated firewall and packet filtering rules. ● Employ cryptography techniques to ensure secure data transmission and storage. ● Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS). ● Enforce industry-leading best practices to bolster Linux network security defenses. Table of Contents 1. Exploring Linux Network Security Fundamentals 2. Creating a Secure Lab Environment 3. Access Control Mechanism in Linux 4. Implementing Firewalls And Packet Filtering 5. Mastering Cryptography for Network Security 6. Intrusion Detection System and Intrusion Prevention System 7. Conducting Vulnerability Assessment with Linux 8. Creating Effective Disaster Recovery Strategies 9. Robust Security Incident Response Plan 10. Best Practices for Linux Network Security Professionals Index
Ultimate Linux Network Security for Enterprises
Author: Adarsh Kant
Publisher: Orange Education Pvt Ltd
ISBN: 8197223866
Category : Computers
Languages : en
Pages : 316
Book Description
"Level Up Your Security Skills with Linux Expertise!" Key Features ● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats. ● Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies. ● Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security. Book Description The Ultimate Linux Network Security for Enterprises is your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems. The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role. From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets. What you will learn ● Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses. ● Develop and deploy resilient security incident response plans. ● Configure and oversee sophisticated firewall and packet filtering rules. ● Employ cryptography techniques to ensure secure data transmission and storage. ● Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS). ● Enforce industry-leading best practices to bolster Linux network security defenses. Table of Contents 1. Exploring Linux Network Security Fundamentals 2. Creating a Secure Lab Environment 3. Access Control Mechanism in Linux 4. Implementing Firewalls And Packet Filtering 5. Mastering Cryptography for Network Security 6. Intrusion Detection System and Intrusion Prevention System 7. Conducting Vulnerability Assessment with Linux 8. Creating Effective Disaster Recovery Strategies 9. Robust Security Incident Response Plan 10. Best Practices for Linux Network Security Professionals Index
Publisher: Orange Education Pvt Ltd
ISBN: 8197223866
Category : Computers
Languages : en
Pages : 316
Book Description
"Level Up Your Security Skills with Linux Expertise!" Key Features ● Comprehensive exploration of Linux network security and advanced techniques to defend against evolving cyber threats. ● Hands-on exercises to reinforce your understanding and gain practical experience in implementing cybersecurity strategies. ● Gain valuable insights from industry best practices to effectively address emerging threats and protect your organization's digital assets within the evolving landscape of Linux network security. Book Description The Ultimate Linux Network Security for Enterprises is your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems. The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization’s networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role. From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization’s digital assets. What you will learn ● Perform thorough vulnerability assessments on Linux networks to pinpoint network weaknesses. ● Develop and deploy resilient security incident response plans. ● Configure and oversee sophisticated firewall and packet filtering rules. ● Employ cryptography techniques to ensure secure data transmission and storage. ● Implement efficient Intrusion Detection and Prevention Systems (IDS/IPS). ● Enforce industry-leading best practices to bolster Linux network security defenses. Table of Contents 1. Exploring Linux Network Security Fundamentals 2. Creating a Secure Lab Environment 3. Access Control Mechanism in Linux 4. Implementing Firewalls And Packet Filtering 5. Mastering Cryptography for Network Security 6. Intrusion Detection System and Intrusion Prevention System 7. Conducting Vulnerability Assessment with Linux 8. Creating Effective Disaster Recovery Strategies 9. Robust Security Incident Response Plan 10. Best Practices for Linux Network Security Professionals Index
Linux for Networking Professionals
Author: Rob VandenBrink
Publisher: Packt Publishing Ltd
ISBN: 1800204655
Category : Computers
Languages : en
Pages : 528
Book Description
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key FeaturesLearn how to solve critical networking problems using real-world examplesConfigure common networking services step by step in an enterprise environmentDiscover how to build infrastructure with an eye toward defense against common attacksBook Description As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learnUse Linux as a troubleshooting and diagnostics platformExplore Linux-based network servicesConfigure a Linux firewall and set it up for network servicesDeploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securelyConfigure Linux for load balancing, authentication, and authorization servicesUse Linux as a logging platform for network monitoringDeploy and configure Intrusion Prevention Services (IPS)Set up Honeypot solutions to detect and foil attacksWho this book is for This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Publisher: Packt Publishing Ltd
ISBN: 1800204655
Category : Computers
Languages : en
Pages : 528
Book Description
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key FeaturesLearn how to solve critical networking problems using real-world examplesConfigure common networking services step by step in an enterprise environmentDiscover how to build infrastructure with an eye toward defense against common attacksBook Description As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learnUse Linux as a troubleshooting and diagnostics platformExplore Linux-based network servicesConfigure a Linux firewall and set it up for network servicesDeploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securelyConfigure Linux for load balancing, authentication, and authorization servicesUse Linux as a logging platform for network monitoringDeploy and configure Intrusion Prevention Services (IPS)Set up Honeypot solutions to detect and foil attacksWho this book is for This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Linux Security Fundamentals
Author: David Clinton
Publisher: John Wiley & Sons
ISBN: 1119781469
Category : Computers
Languages : en
Pages : 192
Book Description
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: • Security Concepts • Encryption • Node, Device and Storage Security • Network and Service Security • Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.
Publisher: John Wiley & Sons
ISBN: 1119781469
Category : Computers
Languages : en
Pages : 192
Book Description
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: • Security Concepts • Encryption • Node, Device and Storage Security • Network and Service Security • Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.
Unix Administration Quick Guide
Author: Saket Jain
Publisher: First Step Publishing
ISBN: 9383306254
Category : Computers
Languages : en
Pages : 388
Book Description
This book not only delivers the theoretical concept of UNIX, but also describes how we can work on it in a live environment. It's just like a "Two in One" package where not only you clear your theoretical concept, but also you get a clear practical view and makes you capable of managing your own UNIX server(s) or home PC. It provides various theoretical and practical concepts in the form of quick tips which attracts a user while reading and develops a crystal clear understanding of various UNIX core concepts which are usually missed when you read a normal UNIX book, which will also prepare you for a UNIX or Linux interview or exam. Since this book is written by an administrator who works on managing live UNIX servers, so it also emphases how to troubleshoot various issues and bring the system and services up in case of any failure.
Publisher: First Step Publishing
ISBN: 9383306254
Category : Computers
Languages : en
Pages : 388
Book Description
This book not only delivers the theoretical concept of UNIX, but also describes how we can work on it in a live environment. It's just like a "Two in One" package where not only you clear your theoretical concept, but also you get a clear practical view and makes you capable of managing your own UNIX server(s) or home PC. It provides various theoretical and practical concepts in the form of quick tips which attracts a user while reading and develops a crystal clear understanding of various UNIX core concepts which are usually missed when you read a normal UNIX book, which will also prepare you for a UNIX or Linux interview or exam. Since this book is written by an administrator who works on managing live UNIX servers, so it also emphases how to troubleshoot various issues and bring the system and services up in case of any failure.
Hackers Beware
Author: Eric Cole
Publisher: Sams Publishing
ISBN: 9780735710092
Category : Computers
Languages : en
Pages : 802
Book Description
Discusses the understanding, fears, courts, custody, communication, and problems that young children must face and deal with when their parents get a divorce.
Publisher: Sams Publishing
ISBN: 9780735710092
Category : Computers
Languages : en
Pages : 802
Book Description
Discusses the understanding, fears, courts, custody, communication, and problems that young children must face and deal with when their parents get a divorce.
Mastering Linux Security and Hardening
Author: Donald A. Tevault
Publisher: Packt Publishing Ltd
ISBN: 1838983597
Category : Computers
Languages : en
Pages : 652
Book Description
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise.What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
Publisher: Packt Publishing Ltd
ISBN: 1838983597
Category : Computers
Languages : en
Pages : 652
Book Description
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise.What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
Linux Server Security
Author: Chris Binnie
Publisher: John Wiley & Sons
ISBN: 1119277655
Category : Computers
Languages : en
Pages : 144
Book Description
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords. Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.
Publisher: John Wiley & Sons
ISBN: 1119277655
Category : Computers
Languages : en
Pages : 144
Book Description
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords. Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.
Technology Best Practices
Author: Robert H. Spencer
Publisher: John Wiley & Sons
ISBN: 0471432636
Category : Business & Economics
Languages : en
Pages : 314
Book Description
Offers access to www.technologybestpractices.com web site containing sample planning templates, contingency plans, policies, annual inventory worksheet, and Help Desk. Includes strategic technology planning, and managing and training techniques Shows how to apply technology tools to improve business.
Publisher: John Wiley & Sons
ISBN: 0471432636
Category : Business & Economics
Languages : en
Pages : 314
Book Description
Offers access to www.technologybestpractices.com web site containing sample planning templates, contingency plans, policies, annual inventory worksheet, and Help Desk. Includes strategic technology planning, and managing and training techniques Shows how to apply technology tools to improve business.
Red Hat Linux Networking and System Administration
Author: Terry Collings
Publisher: *Red Hat
ISBN: 9780764544989
Category : Computers
Languages : en
Pages : 1012
Book Description
* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools * Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network * Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice * Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).
Publisher: *Red Hat
ISBN: 9780764544989
Category : Computers
Languages : en
Pages : 1012
Book Description
* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools * Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network * Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice * Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).
Zero Trust Networks
Author: Evan Gilman
Publisher: "O'Reilly Media, Inc."
ISBN: 149196216X
Category : Computers
Languages : en
Pages : 240
Book Description
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production
Publisher: "O'Reilly Media, Inc."
ISBN: 149196216X
Category : Computers
Languages : en
Pages : 240
Book Description
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production