Zero Trust Architecture: Reducing Attack Surfaces - Training Courses | Afi U.
afiU logo
Explore our 2025-2026 catalogue View all courses
Training and Coaching

Cultivate a learning organization and develop talent.

Customer Experience

Optimize your processes for operational excellence.

Employee Experience

Engage, empower, and enhance employee well-being.

Artificial Intelligence

Master AI and automate your processes.

Leadership

Develop key skills to inspire and mobilize.

Digital Tools

Boost collaboration and productivity within your teams

Strategy and Performance

Align your goals for sustainable growth.

Digital Transformation

Leverage technology to innovate and accelerate your growth.

ContactFAQ

New

Zero Trust Architecture: Reducing Attack Surfaces

Learn to design and implement a Zero Trust architecture to better protect identities, networks, and applications while reducing attack surfaces.
Private session

This training is available in a private or personalized format. It can be provided in one of our training centres or at your offices. Call one of our consultants of submit a request online.

Call now at 1 877 624.2344

  • Duration: 1 day
  • Regular price: On request

Course outline

Duration : 1 Day

© AFI par Edgenda inc.

This course provides a structured approach to designing and implementing Zero Trust Architecture (ZTA). It addresses identity, network, and application-level protections to reduce attack surfaces and enforce continuous verification.

Audience

Security architects, CISOs, and IT directors.

Prerequisites

  • Knowledge of network and identity management concepts
  • Familiarity with cybersecurity frameworks

Objectives

  • Understand Zero Trust principles and core components
  • Design architectures that minimize attack surfaces
  • Implement continuous authentication and authorization
  • Align Zero Trust with compliance requirements

Contents

Module 1: Zero Trust Fundamentals

  • The evolution from perimeter security to Zero Trust
  • Principles: never trust, always verify
  • Core components (identity, device, network, application)

Module 2: Designing Zero Trust Architectures

  • Identity-centric security
  • Microsegmentation and network controls
  • Secure application access

Module 3: Implementation Roadmap

  • Steps for gradual adoption
  • Tools and technologies (Okta, Azure AD, Zscaler, etc.)
  • Integration with existing infrastructure

Module 4: Case Study and Governance

  • Real-world ZTA implementation
  • Policy and compliance alignment
  • Monitoring and maintaining Zero Trust environments

Related Courses

Course material

  • Infrastructure Security
  • GRC Frameworks and Certifications

Architecture blueprints and policy templates provided.