Summary

Completed

In this module, you've learned how to define endpoints. You've also seen how to use the Zero Trust security approach to protect endpoints. This includes registering endpoints with cloud identity providers, granting access only to cloud-managed and compliant endpoints, and more.

Now that you've completed this module, you should be able to:

  • Describe endpoints.
  • Describe attack surface.
  • Describe how to secure endpoints using the Zero Trust approach.

Learn more