Certified Zero Trust Practitioner (CZTP)
An 8 hours of training on Zero Trust security Framework
Recent years have witnessed a surge in digital payments, making payment security a critical concern for organizations. Payment systems process sensitive financial and personal data, making them attractive targets for cyberattacks. Breaches in these systems can result in financial losses, regulatory penalties, and reputational harm, highlighting the need for robust security frameworks like Zero Trust.
Zero Trust is a security model that mandates strict authentication, authorization, and continuous validation of all users and devices before granting access to applications and data. Unlike traditional security models, it does not rely on network location for trust. Instead, access is granted based on stringent verification of identity, device security, and other contextual factors. Core components of Zero Trust include identity verification, least privilege access, micro-segmentation, and continuous monitoring.
The need for Zero Trust arises from the shift toward a mobile workforce accessing cloud-based applications outside traditional business perimeters. Legacy security models, which operated on a “verify, then trust” basis, left organizations vulnerable to data breaches, ransomware, and other threats. By implementing Zero Trust, organizations can ensure data security regardless of user location or device.
Network Intelligence, a leading global cybersecurity firm, helps organizations adopt the Zero Trust framework to enhance their security posture. With expertise in vulnerability assessments, secure encryption, and threat monitoring, Network Intelligence provides tailored solutions to protect sensitive data and mitigate risks. Their commitment to robust security practices empowers businesses to safeguard their digital infrastructures and adapt to evolving cybersecurity challenges.
The training objective is to equip participants with practical knowledge to implement Zero Trust principles effectively, protecting critical assets and achieving long-term security resilience.
Training Details
Asia & Middle East
Date: March 17 – 18, 2025
Timing: 6:00 AM – 10:00 AM GMT
Fees
$ 199
ISACA/ ISC2 Member
Fees
$ 249
Regular Participants
- Mode: Online through Microsoft Teams
- Region: Asia & Middle East
Americas & Europe
Date: March 24- 25, 2025
Timing: 1:00 PM – 5:00 PM GMT
Fees
$ 199
ISACA/ ISC2 Member
Fees
$ 249
Regular Participants
- Mode: Online through Microsoft Teams
- Region: Americas & Europe
Rest of World
Date: March 24 – 25, 2025
Timing: 1:00 PM – 5:00 PM GMT
Fees
$ 199
ISACA/ ISC2 Member
Fees
$ 249
Regular Participants
- Mode: Online through Microsoft Teams
- Region: Rest of world
Objectives of the Program

Eliminate implicit trust by verifying every user, device, and application accessing resources to ensure security

Strengthen access control by applying granular, role-based restrictions aligned with the principle of least privilege

Reduce the attack surface by segmenting networks and limiting the movement of potential threats

Proactively mitigate threats by continuously monitoring and responding to suspicious activities

Secure digital ecosystems by enabling safe access to cloud services, applications, and remote work environments

Foster organizational trust by protecting sensitive data, building customer confidence, and ensuring compliance
Training Supported and Endorsed by ISACA


Know your Trainers

Udit brings over 12 years of expertise in information security, audits, and training. He has conducted PCI DSS audits, ISO 27001 implementations, vulnerability assessments, secure code reviews, HIPAA audits, SOC maturity assessments, and more. Udit has also delivered and developed training programs like CPSP, CDPP, CPFA, and CAISP, ensuring they align with industry standards and address evolving cybersecurity needs.
Certification Curriculum
Part 1
- Introduction to Zero Trust includes its definition, principles, history, evolution, and importance in modern cybersecurity.
- Overview of core components covers identity verification, device security, network segmentation, and least privilege access.
- Zero Trust Architecture explains ZTNA, SDP, and contrasts them with traditional network security models.
- Planning and strategies focus on evaluating the current security posture, defining goals, and creating an implementation roadmap.
- Identity and Access Management explores MFA, SSO, RBAC, and identity governance to secure access to resources.
Part 2
- Network security includes micro-segmentation, traffic analysis, monitoring, and SASE for comprehensive protection.
- Device and endpoint security highlights EDR, MDM, secure configurations, and patch management to safeguard endpoints.
- Data security and privacy emphasize classification, encryption, DLP, and adherence to privacy regulations and compliance standards.
- Threat detection and response focus on behavioral analytics, incident response planning, and SIEM for proactive threat management.
- Automation and orchestration introduce security automation tools and orchestration platforms for streamlined operations.
- Future trends and challenges address emerging technologies and strategies to sustain a Zero Trust environment.
Terms and Conditions
Fees, speakers and date are subject to change.
Any cancellations received within the last ten calendar days would be liable for 50% of the course fees.
Registered attendees unable to attend may send replacements with one week’s notice; refunds are not permitted.
Sample Certificate
