Zscaler Security Engineer Fundamentals (EDU-202)
In-depth training on advanced Zscaler Zero Trust platform configuration, policy management, digital experience monitoring, identity services, and cybersecurity ...
Smart Next Generation Education is a leading EdTech. LEARN MORE NOW
In-depth training on advanced Zscaler Zero Trust platform configuration, policy management, digital experience monitoring, identity services, and cybersecurity ...
Zscaler Security Engineer Fundamentals (EDU-202) is an advanced professional training designed for network and security engineers focusing on Zscaler Zero Trust Exchange, cloud security, and secure connectivity services. It covers advanced platform configuration, identity integration, connectivity, cybersecurity services, risk management, digital experience monitoring, and automation. The course prepares learners for the Zscaler Digital Transformation Engineer (ZDTE) certification through hands-on labs and exam readiness.
- Introduction
- Zscaler for Users - Engineer Overview
- Introduction to Zscaler for Users – Engineer (EDU-202)
- Engineer (EDU-202) Learning Path
- Introduction to Zscaler Experience Center
- Zscaler Experience Center
- Recap
- Zscaler API
- Configuring Admin Sign-On Policy
- Risk Factors
- Zscaler Data Fabric for Security
- Entra ID Change Detection
- Introduction
- A Foundational Overview
- Multi-Tenant Cloud Security Architecture
- Unmatched Protection and Performance
- Zscaler Architecture Deep Dive
- ZIA Architecture Overview
- ZPA Architecture Overview
- ZDX Architecture Overview
- ZIdentity Architecture
- Additional Capabilities
- Subclouds
- Subcloud
- Services in China with Subclouds
- China Premium Access
- API Architecture and Integrations
- Zscaler Internet Access APIs
- ZIA API Use Case
- Zscaler Private Access APIs
- Zscaler Digital Experience APIs
- Zscaler Client Connector APIs
- Introduction
- Recap of Zscaler for Users - Administrator (EDU-200)
- SAML Authentication Workflow
- ZIdentity Authentication Workflow Using SAML
- ZIdentity Authentication Workflow Using OIDC
- Understanding Step-up Authentication
- Working of Step-up Authentication
- Step-up Authentication Workflow
- Use Case for Step-Up Authentication: ZPA
- Configuring Authentication Session
- Configuring Authentication Methods
- Configuring External Identity Providers - Introduction
- Configuring MS Entra ID for SAML Protocol
- Configuring MS Entra ID for OIDC Protocol
- Configuring Policies
- Configuring Password Policy
- Introduction
- Zscaler Client Connector
- Quick Recap: Zscaler for Users - Administrator (EDU-200): Connectivity Services
- Tunnel Mode
- Tunnel Mode (Video)
- GRE Tunnel Options
- GRE Tunnel Options (Video)
00:03:40- IPSec Tunnel Options
- IPSec Tunnel Options (Video)
- Forwarding Profile PAC vs App Profile PAC
- Forwarding Profile PAC vs App Profile PAC (Video)
- Zscaler Branch Connector
- Branch Connector
- Branch Connector Types
- Use Cases
- Zscaler Cloud Connector
- Zscaler Cloud Connector
- Browser Access
- Browser Access (Video)
- Configuring Browser Access & User Portals
- Configuring Browser Access & User Portals (Video)
- Privileged Remote Access
- Privileged Remote Access (Video)
- Configuring Privileged Remote Access
- SD–WAN / Any Router
- Introducing Zscaler Zero Trust SD-WAN
- Traditional SD-WAN versus Zero Trust SD-WAN
- Benefits of Zscaler Zero Trust SD-WAN
- Zscaler SD-WAN
- Zscaler Zero Trust SD-WAN Capabilities
- Zero Trust SD-WAN Use Cases
- Introduction
- Zscaler’s Platform Services Preview
- Quick Recap: Zscaler for Users - Administrator (EDU-200): Platform Services
- Policy Framework
- Quick Recap
- Policy for Zscaler Internet Access
- Policy for Zscaler Private Access
- Policy for Zscaler Digital Experience
- Zscaler Private Service Edges
- What is Private Service Edge?
- ZPA Private Service Edge
- Private Access Service Edge
- Configuring Private Access Service Edge
- Private Access Service Edge Demo
- ZIA Private Service Edge
- ZIA Private Service Edges Types
- Deploying PIA Service Edges
- Private Internet Access Service Edge Demo
- Analytics & Reporting
- Analytics and Reporting (Video)
00:03:59- ZIA Analytics Overview Demo
- ZPA Analytics Demo
- ZDX Analytics Demo
- Nanolog & Log Streaming Services
- Logging Reporting Additional Considerations
- Platform Services Log Streaming Services
- NanoLog Streaming Services Demo
- Traffic Forwarding: Source IP Anchoring
- Source IP Anchoring
- Source IP Anchoring Demo
- Introduction
- Introduction to Zscaler's Access Control Services
- Zscaler Cloud Firewall
- Zscaler Cloud Firewall Architecture
- Zscaler Cloud Firewall Architecture.mp4
- Adaptive Policies for Remote Workforce
- Intrusion Prevention System (IPS)
- APIs for Cloud Firewalls
- Destination and Access Control Policies
- Logging and Reporting
- DNS Control
- DNS Control is about Security and Performance
- DNS Control Capabilities and Features
- DNS Performance
- Resolvers and Traffic Forwarding
- DNS Security
- Additional Capabilities
- DNS Configuration Use Cases and Best Practices
- DNS Configuration Use Cases and Best Practices
- Zscaler DNS Policy Demonstration
- Tenant Restrictions
- Predefined Applications in Tenancy Restiction
- Zscaler Tenant Restrictions Demonstration
- Cloud App Instances/Cloud App Control Policy
- ACS Cloud App Control Policies and Criteria
- ACS Cloud App OneDrive Instances
- Segmentation and Conditional Access through Policies
- Private Application Access
- Configuring Private Application Access
- Segmentation and Application Segmentation
- AI-powered App Segmentation
- AI-powered App Segmentation Benefits
- ACS Application Segmentation Demo
- Microsegmentation
- What is Microsegmentation?
- Microsegmentation Use Cases
- Microsegmentation Benefits
- Server-To-Client Connectivity
- Client-To-Client Connectivity
- Introduction
- Recap from Zscaler for Users - Administrator
- Advanced Threat Protection (ATP)
- Key Differentiator: The World’s Largest Security Cloud
- ATP Configuration Demo
- Cloud Sandbox
- Cloud Sandbox Workflow
- AI Instant Verdict Quarantine
- Cloud Sandbox Policies
- Intrusion Prevention System (IPS)
- Intrusion Prevention System
- Custom IPS Signatures Demo
- Deception
- Zscaler Deception
- How Does Zscaler Deception Work?
- Set up a Zscaler Deception Campaign
- Identity Threat Detection and Response (ITDR)
- How does the Zscaler ITDR Work?
- ITDR Portal Walkthrough
- Private Access AppProtection
- Private Access AppProtection
- Implimenting the AppProtection Flow
- Private AppProtection Configuration Demo
- Browser Isolation
- Setting Up Zero Trust Threat Isolation
- Granular Policy Control Demo
- Zscaler’s Browser Isolation Safe Document Rendering
- Content Disarm and Reconstruction (CDR): Flattened PDF Option in Isolation
- Sandbox Integration with Isolation
- Introduction
- Secure Data in Motion
- Secure Data in Motion
- Advanced Content Inspection Options
- Advanced Content Inspection
- UEBA Alerts
- Comprehensive and Risk Aware Policies
- DLP Demonstration
- Zscaler Outbound Email DLP
- Email DLP Demo
- Protecting Data at Rest for Sanctioned Applications
- Data Security for Data at Rest
- Out of Band CASB Demonstration
- AppTotal Security
- Third Party Apps Challenges
- AppTotal Top Use Cases
- How does the AppTotal Technology Work?
- App Total Demo
- Secure Cloud Data and Endpoint Data
- Data Security Posture Management
- Secure Endpoint Data
- Block Sensitive Data Upload
- Dashboard and Report
- Endpoint DLP - Dashboard and Report
- Secure SaaS Access from BYOD
- Protecting Data in Common Business Scenarios
- VDI-Like Controls with Browser Isolation and PRA
- Unmanaged SaaS & Private Web App Access
- Reducing VDI Dependency
- Introduction
- What is Risk Management?
- Risk Management Security Portfolio
- Risk Management Overview.mp4
- Zscaler Risk360
- Challenges / Problem statement
- How it identifies and assesses 4 stages of attack?
- Annotated Risk Score Trend Chart
- Mapping to Security Risk Framework
- MITRE ATT&CK and NIST Page Overview
- Alerts
- Alerts — Principles and Practices
- Configuring Customized Alerts
- Sample Best Practices for Alerts
- Financial Analysis
- Financial Analysis in Risk360
- Loss Exceedance
- Understanding Loss Exceedance In Risk360
- Data Fabric for Security
- Need for Data Mapping
- Data Unification
- Key Capabilities of the Data Fabric for Security
- The Zscaler Approach
- Unified Vulnerability Management
- UVM Portal Walkthrough
- Breach Predictor
- What is Breach Predictor?
- Breach Predictor Architecture
- BP Process Flow
- How BP Works?
- IOC Detection: URL Fuzzy Matching
- Kill Chain Reconstruction
- Breach Predictor Use Cases
- Zscaler EASM
- Zscaler EASM
- Understanding Assets in EASM
- Asset Discovery
- How Asset Discovery Works
- Setting up Asset Discovery
- Lookalike Domains
- EASM Findings Page Overview — Filtering & Customization
- Deception in a Zero Trust Architecture
- Zero Trust + Deception
- Disrupting Advanced Attacks with Deception
- Deception Standalone Architecture
- Using Deception with ZPA
- Designed for the Zero Trust Exchange
- Deception Use Cases
- Identity Threat Detection and Response (ITDR)
- ITDR Dashboards
- ITDR Dashboards
- ITDR Threat Detection Policies
- Identity Change Detection
- Scanning an Active Directory
- Introduction
- Foundational Concepts Recap
- ZDX Metrics
- Smooth ZDX Score
- Page Fetch Time (PFT)
- Baseline vs Threshold
- Probes
- Types of ZDX Probes
- Web Probe
- Cloud Path Probe
- Cloud Path Legs
- Cloud Path Probes Metrics
- Command Line View
- Configuring Probes
- Configuring a Web Probe
- Configuring a Cloud Path Probe
- Diagnostics
- Initiating a Diagnostics Session
- Benefits of Diagnostics
- Configuring a Diagnostics in ZDX
- ZDX Diagnostics — Hi Fi Meter, Packet Capture Probing, Bandwidth Test Screenshots
- ZDX Diagnostics
Completion of Zscaler for Users – Administrator (EDU-200) or equivalent foundational cybersecurity/cloud security knowledge.
Basic understanding of networking, security policies, and identity management.
Familiarity with Zero Trust Architecture concepts.
Configure advanced connectivity options for Zscaler Zero Trust Exchange including browser access, SD-WAN, and connectors.
Implement identity services such as SAML and SCIM for secure authentication workflows.
Deploy advanced cybersecurity services including threat protection, data security, and access control policies.
Utilize digital experience monitoring (ZDX) to assess performance and user experience.
Manage risk and automation using Zscaler APIs and risk assessment tools to optimize security operations.
Buy Now
Last Updated
Jan 28, 2026
Students
99+
language
English
Duration
10h++Level
beginnerExpiry period
LifetimeCertificate
YesGet exclusive tech courses updates and special offers directly to your inbox.
Complete tech career guide with roadmaps, resources, and insider tips.
This website uses cookies to personalize content and analyse traffic in order to offer you a better experience. Cookie Policy
bigoss
English
Certificate Course
99+ Students
10h++