Zero Trust Access (ZTA) – Outline

Detailed Course Outline

  • ZTA Overview
  • ZTA Components
  • Securing Network Access With FortiNAC
  • Configure ZTNA for Secure Application Access
  • Expanding Secure Access With Endpoint Posture and Compliance Checks
  • Monitoring ZTA Enforcement and Responding to Incidents