Cyberthreat Protection Workshop

Cyberthreat Protection Workshop

This virtual session will use a combination of expert-led lecture, interactive activities, and live discussion to maximize learning while preparing you to use these features in your production environment.

rate limit

Code not recognized.

About this course

Course Description:

Gain a clear understanding of the security capabilities of the Zscaler Zero Trust Exchange. This certification session will cover training on topics from endpoint protection via antivirus to advanced threat protection, including browser isolation and sandbox capabilities to protect users from zero-day attacks.

This session will use a combination of expert-led lecture, interactive activities, and live discussion to maximize learning and retention while preparing you to use these features in your production environment.

Learning Objectives:

  • Understand the various security services that are a part of the Zero Trust Exchange.
  • Identify the browser isolation use case for securing user traffic.
  • Determine the sandbox feature and how it protects from zero-day attacks.
  • Understand how a proactive deception-based defense approach detects active threats by populating the environment with decoys.

Length: 4 hours

Day of Class Details: Laptop required

 

 

About this course

Course Description:

Gain a clear understanding of the security capabilities of the Zscaler Zero Trust Exchange. This certification session will cover training on topics from endpoint protection via antivirus to advanced threat protection, including browser isolation and sandbox capabilities to protect users from zero-day attacks.

This session will use a combination of expert-led lecture, interactive activities, and live discussion to maximize learning and retention while preparing you to use these features in your production environment.

Learning Objectives:

  • Understand the various security services that are a part of the Zero Trust Exchange.
  • Identify the browser isolation use case for securing user traffic.
  • Determine the sandbox feature and how it protects from zero-day attacks.
  • Understand how a proactive deception-based defense approach detects active threats by populating the environment with decoys.

Length: 4 hours

Day of Class Details: Laptop required