Detailed Course Outline
- ZTA Overview
- ZTA Components
- Securing Network Access With FortiNAC
- Configure ZTNA for Secure Application Access
- Expanding Secure Access With Endpoint Posture and Compliance Checks
- Monitoring ZTA Enforcement and Responding to Incidents