Background shape 1 Copy 21 Created with Sketch.

Zero Trust Certification

In an age when cybersecurity threats are everywhere, it’s important to have a rigorous approach to defend and counter escalating risk. Despite the growing consensus that a data-first, workload-driven, and identity-aware framework such as Forrester’s Zero Trust is the preferred approach to information security, many organizations are still unsure how to move from understanding to implementing the framework.

The Zero Trust Certification program arms you and your team with the knowledge, skills, and confidence to adopt Zero Trust at your organization. Gain expertise through a carefully curated combination of hands-on activities and instruction designed by Forrester analysts with extensive Zero Trust experience.

Brands that adopt the Zero Trust (ZTX) framework are better able to future-proof against threats, respond to attacks, and ultimately realize higher growth potential.

Start Your Certification Today

Start with Zero Trust Strategy. Register by March 6 for our next course, beginning on March 9.

Register Now ($2049) or see additional upcoming course dates.

The Zero Trust Certification Journey

Forrester ZTX Strategy badge

Zero Trust Certification is delivered through a cohort-based course. Courses cover 6 competency-based lessons that average between 1-3 hours a week over an 8 week period. Course participants may also be able to claim continuing professional education (CPE) credit with (ISC)2 for the hours spent working toward certification.

Two tracks support different roles, although both tracks cover the same course content.

  • Strategists represent your core information security team and provide recognition for experience and expertise. The Strategist certification requires 3 years of direct cybersecurity work experience. Strategist certification requires additional course content.
  • Associates support Zero Trust execution through cross-functional alignment and shared understanding of concepts. Staff new to security management, or fields that collaborate closely with the organization’s cybersecurity team benefit from Associate certification.

Zero Trust Certification For Individuals

Cohort courses
Maximize opportunities to discuss key topic threads in a dynamic, peer learning environment.

Specific start dates
Begin an 8-week course at designated start dates to gain insights and increase your impact.

Self-paced, online
Fit certification into busy schedules with mobile-friendly lessons to do anytime, anywhere.

Make The Case For Certification

Zero Trust Certification For Teams

Zero Trust is a cross-functional effort for any organization. It requires a thoughtful strategy and buy-in from leaders and their teams. As such, all cybersecurity team members must align around common vocabulary, mindset, and approach. Teams of 20 or more are invited to explore customization options:

  • Enroll in a private course with a start date of your choosing
  • Tailor course discussions to your unique organizational situation
  • Add optional 1:1 feedback sessions with expert analysts
Request A Trial For Teams

Level I: Zero Trust Strategy

Arm yourself with the knowledge and skills required to adopt Zero Trust at your organization. Create the business case for Zero Trust and learn how to build alignment around a common imperative, terminology, and set of tools to mobilize lasting change.

Register by March 6 for our next course, beginning on March 9.

Register Now ($2049)

Topics covered in Zero Trust Strategy

The Zero Trust eXtended Framework
Understand Zero Trust as a holistic approach that includes people, processes, and technologies.

Five Steps To A Zero Trust Network
Quickly begin and iterate on a five-step journey to realize the benefits of a Zero Trust strategy.

The Business Case For Zero Trust
Put Zero Trust in the context of your ultimate goal: protecting data and empowering the organization.

Supporting Zero Trust
Learn how to support Zero Trust across your organization by involving GRC, IR, the SOC, and your organization’s “human firewall.”

Leading Change
Use key risk and performance indicators to build momentum and drive change.

Maturing Zero Trust
Identify policy and process changes to continuously improve and advance your Zero Trust maturity.

View Full Course Syllabus

Enroll In An Upcoming Course

March 9
Register by March 6

May 11
Register by May 8

July 13
Register by July 10

September 14
Register by September 11

October 19
Register by October 16

November 9
Register by November 6

Meet Your Guides

Learn from expert analysts who bring unique experiences, examples and advice to share on cybersecurity best practices.

Stephanie Balaouras

VP, Group Director, Forrester

Chase Cunningham

Chase Cunningham

Principal Analyst, Forrester

Jinan Budge

Principal Analyst, Forrester

Renee Murphy

Principal Analyst, Forrester

Joseph Blankenship

VP, Research Director, Forrester

Jeff Pollard

Jeff Pollard

VP, Principal Analyst, Forrester

In order to adopt Zero Trust, you need to map out your data flows and identify how employees, customers, and applications access data across your organization, regardless of department ownership.

—Chase Cunningham, Forrester Principal Analyst

Complimentary Two Week Trial Of Zero Trust Strategy’s Five Steps to Zero Trust Lesson

Thank you for your interest in our Zero Trust Strategy course. You can now access your Zero Trust Strategy course demo on your mobile phone, tablet, or desktop. We will be in touch with more information about our Zero Trust Strategy course and to answer any questions that you may have.

Zero Trust Strategy Course

Ready to get started now? Give us a call:
Americas: +1 615-395-3401
EMEA: +44 (0) 2073 237741
Asia: +65 6426 7006