Cyberthreat Protection Services : Course 6 of 10 (EDU-200)

Course 6 of 11 in Zscaler for Users - Administrator (EDU-200) eLearning Courses

This course provides an overview of Zscaler's Cybersecurity and Protection capabilities, while dive deeper into the very basic services that Zscaler offer.

rate limit

Code not recognized.

About this course

In this course, you'll gain an overview of Zscaler's Cybersecurity Service suite. You'll start by understanding what cybersecurity is, why it is necessary, and the stages involved in a cyberattack. The course will review different types of cyberattacks and how Zscaler's protection services defend against them. You will then explore Zscaler’s Security Service Suite, including Malware Protection, Advanced Threat Protection, Cloud Sandbox, IPS, Deception, ITDR, Private App Protection, and Browser Isolation. Finally, the course will cover how Zscaler provides Detection and Response capabilities through its alerting framework, ensuring comprehensive protection against modern cyber threats.

The image below shows your position in the EDU-200 Learning Path.

Course Details

Course Title Cybersecurity Services
Course Duration 72 minutes
Course format Online + Hands-on Labs
Assessment End of Module Tests 
Prerequisites Access Control Services: Course 5 of 9 (EDU-200)
Target Audience for this course  Network and Security Administrators, Engineers, and Architects
Certificate

To achieve the Zscaler Digital Transformation Administrator (ZDTA) Certification, complete the following:  
1. EDU-200 eLearning (10 courses)
2. EDU-200 Labs (8 hours)
3. ZDTA Certification exam
 
The ZDTA Certification comes with a LinkedIn Badge.

Content Outline

Topic Name Topic Description Topic Duration
Introduction This topic introduces you to the Zscaler Cybersecurity and learning objectives of this course. 2 minutes
What is Cybersecurity? This topic explains what cybersecurity is, defines cyberattacks, and details how Zscaler delivers comprehensive cyberthreat protection. 10 minutes
Malware Protection This topic explores malware protection, detailing various malware attack delivery mechanisms and the protections Zscaler provides against these threats. 6 minutes
Advanced Threat Protection (ATP) This topic discusses the Advanced Threat Protection (ATP) services offered by Zscaler. 19 minutes
Cloud Sandbox Overview This topic explains how Zscaler Sandbox works, preventing known threats immediately while subjecting suspicious files to in-depth analysis in a controlled environment. 3 minutes
Intrusion Prevention System (IPS) Overview This topic provides an overview of the Intrusion Prevention System (IPS) and its integration with Zero Trust Exchange. 3 minutes
Deception Overview This topic offers an overview of Deception technology and its use of decoys to detect and mitigate threats. 2 minutes
Identity Threat Detection and Response (ITDR) Overview This topic provides an overview of Identity Threat Detection and Response (ITDR). 1 minutes
Private App Protection Overview This topic explains the necessity of Private App Protection and how it functions. 3 minutes
Browser Isolation Overview This topic explains how Browser Isolation works and includes a use case related to cyberthreat protection. 5 minutes
Detection and Response This topic details how Zscaler provides detection and response through the alerting framework built within the Zscaler Internet Access offering. 7 minutes
Quiz

The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts. Passing this Quiz is necessary to proceed to the next topic.

12 minutes
Recap & Resources

This topic summarizes the key concepts covered in the course along with option to download offline Quick Reference Guide and Glossary.

2 minutes

The next course in the EDU-200 Learning Path is Data Protection Services : Course 7 0f 10 (EDU-200)

About this course

In this course, you'll gain an overview of Zscaler's Cybersecurity Service suite. You'll start by understanding what cybersecurity is, why it is necessary, and the stages involved in a cyberattack. The course will review different types of cyberattacks and how Zscaler's protection services defend against them. You will then explore Zscaler’s Security Service Suite, including Malware Protection, Advanced Threat Protection, Cloud Sandbox, IPS, Deception, ITDR, Private App Protection, and Browser Isolation. Finally, the course will cover how Zscaler provides Detection and Response capabilities through its alerting framework, ensuring comprehensive protection against modern cyber threats.

The image below shows your position in the EDU-200 Learning Path.

Course Details

Course Title Cybersecurity Services
Course Duration 72 minutes
Course format Online + Hands-on Labs
Assessment End of Module Tests 
Prerequisites Access Control Services: Course 5 of 9 (EDU-200)
Target Audience for this course  Network and Security Administrators, Engineers, and Architects
Certificate

To achieve the Zscaler Digital Transformation Administrator (ZDTA) Certification, complete the following:  
1. EDU-200 eLearning (10 courses)
2. EDU-200 Labs (8 hours)
3. ZDTA Certification exam
 
The ZDTA Certification comes with a LinkedIn Badge.

Content Outline

Topic Name Topic Description Topic Duration
Introduction This topic introduces you to the Zscaler Cybersecurity and learning objectives of this course. 2 minutes
What is Cybersecurity? This topic explains what cybersecurity is, defines cyberattacks, and details how Zscaler delivers comprehensive cyberthreat protection. 10 minutes
Malware Protection This topic explores malware protection, detailing various malware attack delivery mechanisms and the protections Zscaler provides against these threats. 6 minutes
Advanced Threat Protection (ATP) This topic discusses the Advanced Threat Protection (ATP) services offered by Zscaler. 19 minutes
Cloud Sandbox Overview This topic explains how Zscaler Sandbox works, preventing known threats immediately while subjecting suspicious files to in-depth analysis in a controlled environment. 3 minutes
Intrusion Prevention System (IPS) Overview This topic provides an overview of the Intrusion Prevention System (IPS) and its integration with Zero Trust Exchange. 3 minutes
Deception Overview This topic offers an overview of Deception technology and its use of decoys to detect and mitigate threats. 2 minutes
Identity Threat Detection and Response (ITDR) Overview This topic provides an overview of Identity Threat Detection and Response (ITDR). 1 minutes
Private App Protection Overview This topic explains the necessity of Private App Protection and how it functions. 3 minutes
Browser Isolation Overview This topic explains how Browser Isolation works and includes a use case related to cyberthreat protection. 5 minutes
Detection and Response This topic details how Zscaler provides detection and response through the alerting framework built within the Zscaler Internet Access offering. 7 minutes
Quiz

The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts. Passing this Quiz is necessary to proceed to the next topic.

12 minutes
Recap & Resources

This topic summarizes the key concepts covered in the course along with option to download offline Quick Reference Guide and Glossary.

2 minutes

The next course in the EDU-200 Learning Path is Data Protection Services : Course 7 0f 10 (EDU-200)