Length: 3 Days
Print Friendly, PDF & Email

Zero Trust Technology and Portfolio Management for DoD Professionals Training by Tonex

Zero Trust Technology and Portfolio Management for DoD Professionals

This specialized training equips Department of Defense (DoD) professionals with a comprehensive understanding of zero-trust architecture (ZTA) principles and how to manage and implement a portfolio of technologies to secure mission-critical systems and networks. The program emphasizes strategies aligned with DoD-specific cybersecurity requirements and operational goals.

Target Audience:

  • DoD IT and cybersecurity professionals
  • Cyber operations managers
  • Acquisition and program managers responsible for IT portfolios
  • Defense contractors and integrators
  • Military personnel involved in cyber defense and infrastructure security

Learning Objectives

By the end of this course, participants will:

  • Understand the core principles of zero-trust architecture and its relevance to DoD operations.
  • Learn to evaluate and integrate zero-trust technologies within DoD IT portfolios.
  • Develop strategies for implementing ZTA across complex, distributed environments.
  • Align zero-trust initiatives with DoD cybersecurity policies, including the DoD Zero Trust Strategy.
  • Manage a portfolio of technologies to achieve security goals while ensuring mission readiness.

Course Modules:

Day 1: Foundations of Zero Trust for DoD

Module 1: Introduction to Zero Trust Architecture (ZTA)

  • Core principles: Never trust, always verify; least privilege; segmentation.
  • Evolution of cybersecurity from perimeter-based to zero-trust models.
  • Zero trust in the context of DoD operations and critical infrastructure.

Module 2: DoD-Specific Zero Trust Requirements

  • Overview of the DoD Zero Trust Strategy and related guidelines.
  • Key mandates, including CMMC, NIST 800-207, and Executive Order 14028.
  • Integration of zero-trust with mission-critical systems and operations.

Day 2: Technology Landscape for Zero Trust

Module 3: Core Components of Zero Trust Technology

  • Identity and Access Management (IAM): Multi-factor authentication (MFA), single sign-on (SSO).
  • Network Segmentation and Micro-Segmentation.
  • Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR).
  • Secure Access Service Edge (SASE) and Software-Defined Perimeters (SDP).

Module 4: Evaluating and Selecting Zero Trust Tools

  • Criteria for assessing zero-trust solutions for DoD environments.
  • Overview of tools: Palo Alto Networks, Zscaler, Okta, Microsoft Azure AD, and others.
  • Vendor-neutral frameworks for ensuring interoperability and compliance.

Module 5: Technology Integration Challenges

  • Adapting legacy systems to zero-trust models.
  • Ensuring operational continuity during implementation.
  • Mitigating risks in hybrid and multi-cloud DoD environments.

Day 3: Portfolio Management and Implementation

Module 6: Portfolio Management for Zero Trust Initiatives

  • Structuring IT portfolios to align with zero-trust goals.
  • Balancing innovation, cost, and mission readiness.
  • Monitoring and measuring the performance of zero-trust investments.

Module 7: Implementing Zero Trust in DoD Environments

  • Developing a phased implementation plan for ZTA.
  • Leveraging automation to enforce zero-trust policies.
  • Integrating zero-trust into existing DevSecOps pipelines.

Module 8: Case Studies and Practical Application

  • Real-world examples of zero-trust deployments in defense contexts.
  • Group exercise: Creating a zero-trust roadmap for a simulated DoD scenario.

Key Features:

  • DoD-Specific Focus: Tailored to military and defense operations with compliance at the core.
  • Interactive Labs: Hands-on exercises in technology evaluation, policy implementation, and portfolio management.
  • Expert Instruction: Delivered by cybersecurity professionals experienced with DoD environments and zero-trust strategies.
  • Actionable Frameworks: Practical templates and tools

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.