C2DS Resources

Zero Trust Course

Zero Trust Course Videos

1. Users Pillar Lab

2. Pillar 2 Labs Part 1

2. Device Pillar Labs Part 2

3. Application and Workload Lab

4. Data Labs

5. Network and Environment Lab Part 1

6. Orchestration Labs

Pillar 7 Labs – Part 1

Pillar 7 Labs Part 2

PowerPoints

ZTA class intro
ZTA intro
ZTA Pillar1
Pillar 2 Users
Pillar 3 Applications and Workload
Pillar 4 Data
Pillar 5 Network and Environment
Pillar 6 Automation and Orchestration
Pillar 7 Visibility and Analytics

Presentations

Cyber Threat Detection and Response

Cyber Threat Detection and Response

What are containers?
What are containers?
Securing Cloud-Based Military Communications
Securing Cloud-Based Military Communications
AI Update from AI PC to Accelerators

AI Update from AI PC to Accelerators

Applying Zero Trust Security Mindset to Kubernetes, and a Way to Begin Solving the Problem

Applying Zero Trust Security Mindset to Kubernetes, and a Way to Begin Solving the Problem