This course explores the implementation of Zero Trust Architecture (ZTA) principles in a legacy network. Students will address the quantification of effectiveness as ZTA is incrementally implemented in design and architecture, then proceed to addressing cloud data security, cloud platform and infrastructure security, cloud application security, cloud security operations, cloud risk management and compliance management. ZTA guidelines set forth by the National Institute of Standards and Technology (NIST), Center for Internet Security (CIS), industry accepted best-practices, and data-driven applications in cybersecurity will be leveraged through this course.