Zscaler for Users - Advanced (EDU-202) Instructor Led Training (Private Training)

Zscaler for Users – Advanced is designed to provide you, the network engineer and security administrators / engineers, with a comprehensive overview of deploying and provisioning the advanced features of Zscaler’s Zero Trust Exchange.

Archived

rate limit

Code not recognized.

About this course

This instructor led course consists of 9 modules and lab exercises delivered over a 3 day period.
 
The theory modules are as follows:
  1. Zscaler for Users - Advanced (EDU-202) Overview - What to expect from the training
  2. Zscaler Architecture  - Go deep into the architecture of Zscaler's Zero Trust Exchange
  3. Advanced Identity Services - Understand how Zscaler consumes identity including LDAP and hosted database, configure SAML-based authentication, and identity proxy
  4. Advanced Connectivity - Explore the advanced features of connectivity including connecting to the Zscaler Zero Trust Exchange, browser access, SD-WAN / any router, and Zscaler Cloud Connector
  5. Advanced Platform Services - overview of platform features the ZTE provides including Zscaler Private Access Private Service Edge, Zscaler Internet Access Private Service Edge, traffic forwarding and source IP anchoring
  6. Advanced Digital Experience - learn about the advanced ZDX features and functions, Monitoring digital experience, and configuring digital experience
  7. Advanced Access Control - configure advanced access control features including firewall, DNS Control, tenant restrictions, and segmentation and conditional access through policies
  8. Advanced Cyber Security Services - learn advanced cyber security capabilities including Advanced Threat Protection, Intrusion Prevention System (IPS), Cloud Sandbox, Browser Isolation, Private Access AppProtection, and Deception
  9. Advanced Data Protection Services - learn advanced data protection capabilities including protecting data in motion, inline data protection, data loss prevention, Zscaler browser isolation, protecting data at rest, out-of-band data protection and SSPM, and incident management
In addition to the theory content outlined above, the course includes comprehensive lab exercises.  
 
Each student has 
 
- Access to their own lab Zscaler tenant
- A Microsoft Azure AD tenant
- 5 virtual machines, all of which can be accessed from a normal browser without the installation of complicated software
 
The lab exercises are as follows:
  1. Connect to the Virtual Lab
  2. Identity Services–Configure ZIA User Authentication
  3. Identity Services–Configure ZIA SCIM Authorization
  4. Identity Services–Configure ZPA User Authentication
  5. Identity Services–Configure ZPA SCIM Authorization
  6. Lab 6: Connectivity Services–Configure Browser Access for 3rd Parties
  7. Platform Services–Configure Log Streaming
  8. Zscaler Digital Experience–Configure Alerts & Diagnostic
  9. Access Control Services–Configure & Examine Firewall Policies
  10. Cyberthreat Protection Services–Configure Sandbox File Inspection
  11. Cyberthreat Protection Services–Browser Isolation
  12. Cyberthreat Protection Services–Deception-Based Active Defense
  13. Data Protection Services–Explore Application and Data Visibility
  14. Data Protection Services–Data Classification
  15. Data Protection Services–Manage Incidents with Zscaler Workflow Automation (ZWA)

About this course

This instructor led course consists of 9 modules and lab exercises delivered over a 3 day period.
 
The theory modules are as follows:
  1. Zscaler for Users - Advanced (EDU-202) Overview - What to expect from the training
  2. Zscaler Architecture  - Go deep into the architecture of Zscaler's Zero Trust Exchange
  3. Advanced Identity Services - Understand how Zscaler consumes identity including LDAP and hosted database, configure SAML-based authentication, and identity proxy
  4. Advanced Connectivity - Explore the advanced features of connectivity including connecting to the Zscaler Zero Trust Exchange, browser access, SD-WAN / any router, and Zscaler Cloud Connector
  5. Advanced Platform Services - overview of platform features the ZTE provides including Zscaler Private Access Private Service Edge, Zscaler Internet Access Private Service Edge, traffic forwarding and source IP anchoring
  6. Advanced Digital Experience - learn about the advanced ZDX features and functions, Monitoring digital experience, and configuring digital experience
  7. Advanced Access Control - configure advanced access control features including firewall, DNS Control, tenant restrictions, and segmentation and conditional access through policies
  8. Advanced Cyber Security Services - learn advanced cyber security capabilities including Advanced Threat Protection, Intrusion Prevention System (IPS), Cloud Sandbox, Browser Isolation, Private Access AppProtection, and Deception
  9. Advanced Data Protection Services - learn advanced data protection capabilities including protecting data in motion, inline data protection, data loss prevention, Zscaler browser isolation, protecting data at rest, out-of-band data protection and SSPM, and incident management
In addition to the theory content outlined above, the course includes comprehensive lab exercises.  
 
Each student has 
 
- Access to their own lab Zscaler tenant
- A Microsoft Azure AD tenant
- 5 virtual machines, all of which can be accessed from a normal browser without the installation of complicated software
 
The lab exercises are as follows:
  1. Connect to the Virtual Lab
  2. Identity Services–Configure ZIA User Authentication
  3. Identity Services–Configure ZIA SCIM Authorization
  4. Identity Services–Configure ZPA User Authentication
  5. Identity Services–Configure ZPA SCIM Authorization
  6. Lab 6: Connectivity Services–Configure Browser Access for 3rd Parties
  7. Platform Services–Configure Log Streaming
  8. Zscaler Digital Experience–Configure Alerts & Diagnostic
  9. Access Control Services–Configure & Examine Firewall Policies
  10. Cyberthreat Protection Services–Configure Sandbox File Inspection
  11. Cyberthreat Protection Services–Browser Isolation
  12. Cyberthreat Protection Services–Deception-Based Active Defense
  13. Data Protection Services–Explore Application and Data Visibility
  14. Data Protection Services–Data Classification
  15. Data Protection Services–Manage Incidents with Zscaler Workflow Automation (ZWA)