Cyberthreat Protection Services : Course 6 of 10 (EDU-200)
Course 6 of 11 in Zscaler for Users - Administrator (EDU-200) eLearning Courses
This course provides an overview of Zscaler's Cybersecurity and Protection capabilities, while dive deeper into the very basic services that Zscaler offer.
In this course, you'll gain an overview of Zscaler's Cybersecurity Service suite. You'll start by understanding what cybersecurity is, why it is necessary, and the stages involved in a cyberattack. The course will review different types of cyberattacks and how Zscaler's protection services defend against them. You will then explore Zscaler’s Security Service Suite, including Malware Protection, Advanced Threat Protection, Cloud Sandbox, IPS, Deception, ITDR, Private App Protection, and Browser Isolation. Finally, the course will cover how Zscaler provides Detection and Response capabilities through its alerting framework, ensuring comprehensive protection against modern cyber threats.
The image below shows your position in the EDU-200 Learning Path.
Course Details
Course Title | Cybersecurity Services |
Course Duration | 72 minutes |
Course format | Online + Hands-on Labs |
Assessment | End of Module Tests |
Prerequisites | Access Control Services: Course 5 of 9 (EDU-200) |
Target Audience for this course | Network and Security Administrators, Engineers, and Architects |
Certificate |
To achieve the Zscaler Digital Transformation Administrator (ZDTA) Certification, complete the following: |
Content Outline
Topic Name | Topic Description | Topic Duration |
Introduction | This topic introduces you to the Zscaler Cybersecurity and learning objectives of this course. | 2 minutes |
What is Cybersecurity? | This topic explains what cybersecurity is, defines cyberattacks, and details how Zscaler delivers comprehensive cyberthreat protection. | 10 minutes |
Malware Protection | This topic explores malware protection, detailing various malware attack delivery mechanisms and the protections Zscaler provides against these threats. | 6 minutes |
Advanced Threat Protection (ATP) | This topic discusses the Advanced Threat Protection (ATP) services offered by Zscaler. | 19 minutes |
Cloud Sandbox Overview | This topic explains how Zscaler Sandbox works, preventing known threats immediately while subjecting suspicious files to in-depth analysis in a controlled environment. | 3 minutes |
Intrusion Prevention System (IPS) Overview | This topic provides an overview of the Intrusion Prevention System (IPS) and its integration with Zero Trust Exchange. | 3 minutes |
Deception Overview | This topic offers an overview of Deception technology and its use of decoys to detect and mitigate threats. | 2 minutes |
Identity Threat Detection and Response (ITDR) Overview | This topic provides an overview of Identity Threat Detection and Response (ITDR). | 1 minutes |
Private App Protection Overview | This topic explains the necessity of Private App Protection and how it functions. | 3 minutes |
Browser Isolation Overview | This topic explains how Browser Isolation works and includes a use case related to cyberthreat protection. | 5 minutes |
Detection and Response | This topic details how Zscaler provides detection and response through the alerting framework built within the Zscaler Internet Access offering. | 7 minutes |
Quiz |
The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts. Passing this Quiz is necessary to proceed to the next topic. |
12 minutes |
Recap & Resources |
This topic summarizes the key concepts covered in the course along with option to download offline Quick Reference Guide and Glossary. |
2 minutes |
The next course in the EDU-200 Learning Path is Data Protection Services : Course 7 0f 10 (EDU-200).