General interest in IT security strategies and the Zero Trust philosophy, as well as technical know-how in connection with IT architectures.
Objective
In addition to an understanding of the Zero Trust philosophy and pure knowledge transfer, an exemplary end-to-end scenario is developed as a practical exercise. This will give you an introduction to the topic of Zero Trust with the aim of using Zero Trust as a possible framework for your own IT security strategy.
Target group
Maintenance/mechatronics/machine operators, Internet/data protection/security officers, Network administrators, PC user service, Service technicians, Security experts, Support technicians