Overview

This two-day instructor-led course provides a comprehensive introduction to Zero Trust concepts, principles, and architectures as defined by the Cloud Security Alliance (CSA). Participants will learn how to design, implement, and maintain Zero Trust strategies that align with modern enterprise and cloud environments.

Building on the foundational principle that no entity human or system can be implicitly trusted, this course enables learners to integrate Zero Trust into organisational planning, architecture, and technology deployment. Through a blend of theory, guided discussion, and applied examples, learners will develop the capability to reduce organisational risk and strengthen cyber resilience.

Read more +

Prerequisites

There are no formal prerequisites for the CCZT.
It is recommended that participants have:

  • A basic understanding of networking and network security
  • Familiarity with cloud security principles or frameworks such as QAPCCS, CCSKPLUS, or CCSP

Target audience

This course is designed for professionals involved in designing, implementing, or governing information security strategies, including:

  • Security architects, analysts, and consultants
  • Cloud and network engineers
  • IT managers and system administrators
  • Risk and compliance officers seeking to align Zero Trust with governance frameworks
  • Technical decision-makers responsible for enterprise-wide security transformation

Read more +

Delegates will learn how to

By the end of this course, participants will be able to:

  • Explain the concept of a Software-Defined Perimeter (SDP) and its relationship to Zero Trust
  • Communicate the technology and business challenges that SDP and Zero Trust address
  • Distinguish between key types of SDP deployment models
  • Demonstrate understanding of the Zero Trust Maturity Model and its role in supporting organisational planning
  • Identify the key steps and considerations involved in Zero Trust strategy development
  • Map organisational data flows to identify protect and attack surfaces
  • Apply recognised methods such as gap analysis, risk registers, and RACI diagrams in a Zero Trust planning process
  • Design and plan Zero Trust policies aligned to business objectives
  • Explain the preparatory and implementation activities required for Zero Trust Architecture (ZTA) adoption
  • Leverage Zero Trust pillars and cross-cutting capabilities to build workflow documentation and audit-ready processes

Read more +

Outline

Zero Trust Architecture

  • Introduction to Zero Trust Architecture
  • Definitions, concepts, and core components
  • Objectives and business benefits of Zero Trust
  • Key planning considerations for ZTA adoption
  • Implementation examples and organisational use cases

Software-Defined Perimeter (SDP)

  • Introduction to SDP and its evolution
  • Traditional architecture limitations and SDP solutions
  • Core tenets, underlying technologies, and architecture principles
  • Common SDP deployment models and examples

Zero Trust Strategy

  • Levels of strategy and governance alignment
  • Identifying Zero Trust drivers and building executive buy-in
  • Tactical approaches and operational integration
  • Embedding Zero Trust into day-to-day operations

Zero Trust Planning

  • Initiating the Zero Trust journey
  • Defining project scope, priorities, and business cases
  • Conducting gap analysis and capability assessments
  • Defining protect and attack surfaces
  • Documenting transaction flows and identifying dependencies
  • Policy development for Zero Trust controls
  • Building and validating a target architecture

Zero Trust Implementation

  • Advancing along the Zero Trust maturity path
  • Project implementation planning and stakeholder engagement
  • Preparatory activities for deployment
  • Phased implementation of the Zero Trust target architecture
  • Reviewing assumptions and maintaining continuous improvement

Exams and assessments

Each enrolment includes an official CCZT Exam Voucher with two attempts.

  • The exam assesses comprehension and application of Zero Trust principles and practices.
  • Exam vouchers are valid for two years and are non-transferable.
  • A Certificate of Completion and 14 Continuing Professional Education (CPE) credits are awarded upon successful completion.

Hands-on learning

The course integrates practical case studies and interactive exercises that reinforce key Zero Trust concepts.

  • Real-world scenarios guide learners through policy definition, data flow mapping, and architecture planning.
  • Group discussions encourage collaboration and application of theory to organisational contexts.
  • Instructor-led demonstrations provide clear examples of SDP and ZTA design and deployment.

Read more +

QA is proud to be an official Cloud Security Alliance training provider

Zero Trust Explained

Learn more about Zero Trust and what it means for your organisation. 

Special Notices

QA is proud to be a Cloud Security Alliance (CSA) Official Partner.

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Governance
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
Continuity & Resilience
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing

Secure Engineering learning paths

Want to boost your career in Secure Engineering? View QA's learning pathway below, specially designed to give you the skills to succeed.

= Required
= Certification
Application Security
Secure Coding
Security Architect

Cyber Defensive Operations learning paths

Want to boost your career in Cyber Defensive Operations? View QA's learning pathways below, specially designed to give you the skills to succeed.

= Required
= Certification
Cyber Blue Team
DFIR Digital Forensics & Incident Response
Security Tech Generalist
Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.

Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

A member of the team will contact you within 4 working hours after submitting the form.

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy and Terms & Conditions. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.