Access Control Services: Course 6 of 11 (EDU-202)

Course 6 of 12 in Zscaler for Users - Engineer (EDU-202) eLearning Courses

Configure and Optimize Zscaler Access Control Policies for Secure Application Access.

rate limit

Code not recognized.

About this course

In this course, you will gain an overview of how Zscaler enforces access control policies through the Zero Trust Exchange platform and a comprehensive understanding of the key components within Zscaler’s Access Control Services suite, including access control mechanisms, Intrusion Prevention System (IPS), DNS security, tenant restrictions, and secure application segmentation strategies.

The image below shows your position in the EDU-202 Learning Path.


Course Details

Course Title

Access Control Services

Course Duration 130 minutes
Course Format Online + Hands-on Lab + Capstone Project + Exam
Assessment  End of Module Tests
Prerequisites

Platform Services: Course 5 of 11 (EDU-202)

Target Audience for this course Network and Security Administrators, Engineers, and Architects 
Certificate

To achieve the Zscaler Digital Transformation Engineer (ZDTE) Certification, complete the following:  

  1. EDU-202 eLearning (11 courses)
  2. EDU-202 Labs (Hands-on Lab + Capstone Project) (9 hours)
  3. ZDTE Certification Exam

 The ZDTE Certification comes with a Credly Badge. 

Course Outline

Topic Name Topic Description Topic Duration 
Introduction This topic covers the overview and learning objectives of the course. 5 minutes

Introduction to Zscaler's Access Control Services

This topic recaps key concepts from Zscaler For Users Essentials - Access Control Services (Course 5 of 10), including the Zscaler Cloud Firewall, which eliminates hardware limitations, and its ability to configure granular policies and perform deep packet inspection for over 1,300 network apps and 8,000-12,000 cloud/SaaS apps, enabling control over network services and protocols.

5 minutes
Zscaler Cloud Firewall This topic covers how Zscaler's cloud firewall simplifies security by automating policy enforcement, adapting to diverse environments, and ensuring consistent protection for remote workforces. 25 minutes

DNS Control

This topic covers how Zscaler's DNS Control enhances performance and security by delivering low-latency DNS resolution, safeguarding against threats such as data exfiltration, and enabling flexible access control.

25 minutes
Tenant Restrictions This topic covers how Zscaler's Tenant Restrictions and Cloud App Control Policies secure cloud applications by limiting third-party access to authorized tenants and defining app permissions, reducing data leakage and violations while providing granular control over access. 20 minutes

Segmentation and Conditional Access through Policies 

This topic covers how ZPA strengthens security by implementing strict access controls, ensuring users can access only the applications they are authorized to use, while segmentation and policies help maintain a secure and efficient environment.

25 minutes

Microsegmentation

This topic covers how microsegmentation improves security by isolating network segments, stopping lateral movement of threats, and providing detailed traffic control.

10 minutes
Quiz The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts allowed. Passing this Quiz is necessary to proceed to the next topic. 10 minutes
Recap & Resources This section is a wrap-up of your learning in this course. You will also be able to access the glossary and quick reference guide in this section. 5 minutes

The next course in the EDU-202 Learning Path is Cyberthreat Protection Services: Course 6 of 11 (EDU-202).

About this course

In this course, you will gain an overview of how Zscaler enforces access control policies through the Zero Trust Exchange platform and a comprehensive understanding of the key components within Zscaler’s Access Control Services suite, including access control mechanisms, Intrusion Prevention System (IPS), DNS security, tenant restrictions, and secure application segmentation strategies.

The image below shows your position in the EDU-202 Learning Path.


Course Details

Course Title

Access Control Services

Course Duration 130 minutes
Course Format Online + Hands-on Lab + Capstone Project + Exam
Assessment  End of Module Tests
Prerequisites

Platform Services: Course 5 of 11 (EDU-202)

Target Audience for this course Network and Security Administrators, Engineers, and Architects 
Certificate

To achieve the Zscaler Digital Transformation Engineer (ZDTE) Certification, complete the following:  

  1. EDU-202 eLearning (11 courses)
  2. EDU-202 Labs (Hands-on Lab + Capstone Project) (9 hours)
  3. ZDTE Certification Exam

 The ZDTE Certification comes with a Credly Badge. 

Course Outline

Topic Name Topic Description Topic Duration 
Introduction This topic covers the overview and learning objectives of the course. 5 minutes

Introduction to Zscaler's Access Control Services

This topic recaps key concepts from Zscaler For Users Essentials - Access Control Services (Course 5 of 10), including the Zscaler Cloud Firewall, which eliminates hardware limitations, and its ability to configure granular policies and perform deep packet inspection for over 1,300 network apps and 8,000-12,000 cloud/SaaS apps, enabling control over network services and protocols.

5 minutes
Zscaler Cloud Firewall This topic covers how Zscaler's cloud firewall simplifies security by automating policy enforcement, adapting to diverse environments, and ensuring consistent protection for remote workforces. 25 minutes

DNS Control

This topic covers how Zscaler's DNS Control enhances performance and security by delivering low-latency DNS resolution, safeguarding against threats such as data exfiltration, and enabling flexible access control.

25 minutes
Tenant Restrictions This topic covers how Zscaler's Tenant Restrictions and Cloud App Control Policies secure cloud applications by limiting third-party access to authorized tenants and defining app permissions, reducing data leakage and violations while providing granular control over access. 20 minutes

Segmentation and Conditional Access through Policies 

This topic covers how ZPA strengthens security by implementing strict access controls, ensuring users can access only the applications they are authorized to use, while segmentation and policies help maintain a secure and efficient environment.

25 minutes

Microsegmentation

This topic covers how microsegmentation improves security by isolating network segments, stopping lateral movement of threats, and providing detailed traffic control.

10 minutes
Quiz The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts allowed. Passing this Quiz is necessary to proceed to the next topic. 10 minutes
Recap & Resources This section is a wrap-up of your learning in this course. You will also be able to access the glossary and quick reference guide in this section. 5 minutes

The next course in the EDU-202 Learning Path is Cyberthreat Protection Services: Course 6 of 11 (EDU-202).