Risk Management: Course 9 of 11 (EDU-202)

Course 9 of 12 in Zscaler for Users - Engineer (EDU-202) eLearning Courses

This course is crucial in equipping you with the knowledge and solutions to manage and mitigate cyber risks effectively within your organization.

rate limit

Code not recognized.

About this course

In this course, we will delve into various Zscaler products and solutions that enhance your organization's security posture through comprehensive Risk Management Strategies. The key aspects covered in this course include Zscaler RISK 360 providing and overview of a powerful risk quantification and visualization framework, discuss how Zscaler Data Fabric and UVM revolutionizes vulnerability management, understand how Zscaler’s AI powered product helps in enhancing an organization's security posture, cover an overview of Zscaler EASM, and finally we will focus on Deception: Architecture and Use Cases and explore how ITDR continuously monitors the Active Directory (AD) domain for any identity-based threats.   

The image below shows your position in the EDU-202 Learning Path.

Course Details

Course Title Risk Management
Course Duration 150 minutes
Course format Online + Hands-on Lab + Capstone Project + Exam
Assessment End of Course Tests 
Prerequisites Data Protection Services: Course 9 of 11 (EDU-202)
Target Audience for this course  Engineers, and Architects
Certificate

To achieve the Zscaler Digital Transformation Engineer (ZDTE) Certification, complete the following:  

1. EDU-202 eLearning (11 courses)
2. EDU-202 Labs (Hands-on Lab + Capstone Project) (8 hours)
3. ZDTE Certification exam
 
The ZDTE Certification comes with a Credly Badge. 

Content Outline

Topic Name Topic Description Topic Duration
Introduction This topic covers the overview and learning objectives of the course. 5 minutes
What is Risk Management?

This lesson describes an overview of risk management and quick recap of Risk Management - Administrator course.

10 minutes
Risk Management Security Portfolio

In this section, we will cover an array of products and services designed to help your organization reduce and mitigate potential risks.

15 minutes
Zscaler Risk360

In this section, we'll cover the contributing factors to organizational Risk Score and Zscaler Risk360 dashboard.

15 minutes
Alerts

In this lesson, we will cover the process of configuring alert rules for various criteria.

15 minutes
Financial Analysis

In this lesson, we will focus on the detailed explanation of the Financial Analysis feature in Risk360.

10 minutes
Data Fabric for Security

In this section, we'll discuss how Zscaler Data Fabric and UVM revolutionizes vulnerability management with a holistic and data-centric approach.

15 minutes
Unified Vulnerability Management

In this section, we'll discuss the steps to operationalize your Data to solve UVM.

10 minutes
Breach Predictor

In this lesson, we will focus on the architecture Breach Predictor and its workflow.

10 minutes
Zscaler EASM

In this section, we'll cover the overview of Zscaler EASM involves identifying and monitoring internal business assets that are exposed to the public internet.

10 minutes
Deception

In this lesson, we will focus on Deception: Architecture and Use Cases.

10 minutes
Identity Threat Detection and Response (ITDR)

In this lesson, we will focus on the ITDR Posture — Active Directory Dashboard.

10 minutes
Quiz

The quiz tests the key concepts you learned so far. You need 80% to pass, unlimited attempts allowed. Passing this Quiz is necessary to proceed to the next topic.

10 minutes
Recap & Resources

The last lesson provides an overview of what you have learned in this course, along with a quick reference guide and glossary.

5 minutes

The next course in the EDU-202 Learning Path is Course 10 of 11: Zscaler Digital Experience.

About this course

In this course, we will delve into various Zscaler products and solutions that enhance your organization's security posture through comprehensive Risk Management Strategies. The key aspects covered in this course include Zscaler RISK 360 providing and overview of a powerful risk quantification and visualization framework, discuss how Zscaler Data Fabric and UVM revolutionizes vulnerability management, understand how Zscaler’s AI powered product helps in enhancing an organization's security posture, cover an overview of Zscaler EASM, and finally we will focus on Deception: Architecture and Use Cases and explore how ITDR continuously monitors the Active Directory (AD) domain for any identity-based threats.   

The image below shows your position in the EDU-202 Learning Path.

Course Details

Course Title Risk Management
Course Duration 150 minutes
Course format Online + Hands-on Lab + Capstone Project + Exam
Assessment End of Course Tests 
Prerequisites Data Protection Services: Course 9 of 11 (EDU-202)
Target Audience for this course  Engineers, and Architects
Certificate

To achieve the Zscaler Digital Transformation Engineer (ZDTE) Certification, complete the following:  

1. EDU-202 eLearning (11 courses)
2. EDU-202 Labs (Hands-on Lab + Capstone Project) (8 hours)
3. ZDTE Certification exam
 
The ZDTE Certification comes with a Credly Badge. 

Content Outline

Topic Name Topic Description Topic Duration
Introduction This topic covers the overview and learning objectives of the course. 5 minutes
What is Risk Management?

This lesson describes an overview of risk management and quick recap of Risk Management - Administrator course.

10 minutes
Risk Management Security Portfolio

In this section, we will cover an array of products and services designed to help your organization reduce and mitigate potential risks.

15 minutes
Zscaler Risk360

In this section, we'll cover the contributing factors to organizational Risk Score and Zscaler Risk360 dashboard.

15 minutes
Alerts

In this lesson, we will cover the process of configuring alert rules for various criteria.

15 minutes
Financial Analysis

In this lesson, we will focus on the detailed explanation of the Financial Analysis feature in Risk360.

10 minutes
Data Fabric for Security

In this section, we'll discuss how Zscaler Data Fabric and UVM revolutionizes vulnerability management with a holistic and data-centric approach.

15 minutes
Unified Vulnerability Management

In this section, we'll discuss the steps to operationalize your Data to solve UVM.

10 minutes
Breach Predictor

In this lesson, we will focus on the architecture Breach Predictor and its workflow.

10 minutes
Zscaler EASM

In this section, we'll cover the overview of Zscaler EASM involves identifying and monitoring internal business assets that are exposed to the public internet.

10 minutes
Deception

In this lesson, we will focus on Deception: Architecture and Use Cases.

10 minutes
Identity Threat Detection and Response (ITDR)

In this lesson, we will focus on the ITDR Posture — Active Directory Dashboard.

10 minutes
Quiz

The quiz tests the key concepts you learned so far. You need 80% to pass, unlimited attempts allowed. Passing this Quiz is necessary to proceed to the next topic.

10 minutes
Recap & Resources

The last lesson provides an overview of what you have learned in this course, along with a quick reference guide and glossary.

5 minutes

The next course in the EDU-202 Learning Path is Course 10 of 11: Zscaler Digital Experience.