Architectures & Components of Software-Defined Perimeter

Architectures & Components of Software-Defined Perimeter

In this course, learners will get an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.


This course is intended to provide learners with an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models. Learners will be guided through the various interactions and mechanisms that form the basis of an organization’s SDP-based Zero Trust Architecture.

After completing this course, learners will be able to:

  • Understand the main components that make up an SDP architecture
  • Describe the onboarding and access workflows established for supporting SDP processes 
  • Describe the communication flows that occur between SDP components     
  • Explain the SDP logging mechanisms and the role they play in SDP architectures 
  • Understand CSA’s SDP and NIST’s ZTA deployment models

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

After completing this course you will receive a certificate for 1 course hour that can be submitted for possible CPE credits.

Curriculum

  • Architectures & Components of Software-Defined Perimeter Study Guide
  • SDP Components
  • SDP Workflows
  • SDP Communication Flows
  • SDP Logging
  • SDP & NIST ZTA Deployment Models
  • Course Survey

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.


This course is intended to provide learners with an in-depth look at the main components, workflows, communication flows, and logging of Software-Defined Perimeter (SDP), as well as SDP and NIST Zero Trust Architecture deployment models. Learners will be guided through the various interactions and mechanisms that form the basis of an organization’s SDP-based Zero Trust Architecture.

After completing this course, learners will be able to:

  • Understand the main components that make up an SDP architecture
  • Describe the onboarding and access workflows established for supporting SDP processes 
  • Describe the communication flows that occur between SDP components     
  • Explain the SDP logging mechanisms and the role they play in SDP architectures 
  • Understand CSA’s SDP and NIST’s ZTA deployment models

This course is a great fit for users in any of the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers

 

After completing this course you will receive a certificate for 1 course hour that can be submitted for possible CPE credits.

Curriculum

  • Architectures & Components of Software-Defined Perimeter Study Guide
  • SDP Components
  • SDP Workflows
  • SDP Communication Flows
  • SDP Logging
  • SDP & NIST ZTA Deployment Models
  • Course Survey