Access Control Services: Course 6 of 11 (EDU-202)
Course 6 of 12 in Zscaler for Users - Engineer (EDU-202) eLearning Courses
Configure and Optimize Zscaler Access Control Policies for Secure Application Access.
In this course, you will gain an overview of how Zscaler enforces access control policies through the Zero Trust Exchange platform and a comprehensive understanding of the key components within Zscaler’s Access Control Services suite, including access control mechanisms, Intrusion Prevention System (IPS), DNS security, tenant restrictions, and secure application segmentation strategies.
The image below shows your position in the EDU-202 Learning Path.
Course Details
Course Title |
Access Control Services |
Course Duration | 130 minutes |
Course Format | Online + Hands-on Lab + Capstone Project + Exam |
Assessment | End of Module Tests |
Prerequisites |
Platform Services: Course 5 of 11 (EDU-202) |
Target Audience for this course | Network and Security Administrators, Engineers, and Architects |
Certificate |
To achieve the Zscaler Digital Transformation Engineer (ZDTE) Certification, complete the following:
The ZDTE Certification comes with a Credly Badge. |
Course Outline
Topic Name | Topic Description | Topic Duration |
Introduction | This topic covers the overview and learning objectives of the course. | 5 minutes |
Introduction to Zscaler's Access Control Services |
This topic recaps key concepts from Zscaler For Users Essentials - Access Control Services (Course 5 of 10), including the Zscaler Cloud Firewall, which eliminates hardware limitations, and its ability to configure granular policies and perform deep packet inspection for over 1,300 network apps and 8,000-12,000 cloud/SaaS apps, enabling control over network services and protocols. |
5 minutes |
Zscaler Cloud Firewall | This topic covers how Zscaler's cloud firewall simplifies security by automating policy enforcement, adapting to diverse environments, and ensuring consistent protection for remote workforces. | 25 minutes |
DNS Control |
This topic covers how Zscaler's DNS Control enhances performance and security by delivering low-latency DNS resolution, safeguarding against threats such as data exfiltration, and enabling flexible access control. |
25 minutes |
Tenant Restrictions | This topic covers how Zscaler's Tenant Restrictions and Cloud App Control Policies secure cloud applications by limiting third-party access to authorized tenants and defining app permissions, reducing data leakage and violations while providing granular control over access. | 20 minutes |
Segmentation and Conditional Access through Policies |
This topic covers how ZPA strengthens security by implementing strict access controls, ensuring users can access only the applications they are authorized to use, while segmentation and policies help maintain a secure and efficient environment. |
25 minutes |
Microsegmentation |
This topic covers how microsegmentation improves security by isolating network segments, stopping lateral movement of threats, and providing detailed traffic control. |
10 minutes |
Quiz | The quiz tests the key concepts you learned so far. You need 80% to pass, with unlimited attempts allowed. Passing this Quiz is necessary to proceed to the next topic. | 10 minutes |
Recap & Resources | This section is a wrap-up of your learning in this course. You will also be able to access the glossary and quick reference guide in this section. | 5 minutes |
The next course in the EDU-202 Learning Path is Cyberthreat Protection Services: Course 6 of 11 (EDU-202).