Zscaler for Users - Administrator (EDU-200)
This learning path provides a comprehensive overview of the Zscaler for Users platform. It introduces learners to solutions and capabilities Zscaler offers as part of the Zero Trust Exchange to secure organizations’ users and their business critical applications.
Get Started
highlight
Zscaler for Users Platform
Zscaler for Users - Engineer (EDU-202)
This path introduces learners to the advanced solutions and capabilities of the Zscaler's Zero Trust Exchange. It guides the learners through configurations to provision and monitor the advanced features and functionalities of the Zero Trust Exchange.
Get Started
highlight
Zscaler for Users Platform
Zscaler for Users - Delivery Consultant (EDU-302)
This learning path enables you to successfully deploy the various products and services within the Zscaler Zero Trust Exchange using the recommended deployment approaches.
Get started
highlight
Security Operations (EDU-250)
Explore Zscaler's products and solutions to enhance your organization's security posture through comprehensive risk management strategies. Gain foundational knowledge in risk management and dive deep into advanced tools like UVM, EASM, Deception, ITDR, and Breach Predictor.
Get Started
highlight
English
Advanced
Live (Virtual/In-person)
Mastering the Fundamentals of Zero Trust (EDU-104)
In this course you will get introduced to Zscaler's Zero Trust concept, fundamental architecture, core principles, and real-world business use cases for securing users, workloads and applications.
Get Started
highlight
English
Zscaler Zero Trust Automation (EDU-270)
In this course, you will gain an overview of APIs, Zscaler Zero Trust Automation platform, ZIdentity, OneAPI framework and architecture, and common use cases for automation.
Get Started
highlight
English
Zero Trust Branch (EDU-280)
The Zero Trust Branch (EDU-280) eLearning Course explores Securing External Communication, Securing Internal Communication and how Zscaler PRA seamlessly secures connections to critical systems while enhancing productivity and agility in managing privileged access.
Get Started
highlight
English