Zscaler User & Administrator Fundamentals (EDU-200)
A foundational course covering Zscaler’s Zero Trust Exchange platform fundamentals, essential configurations, and key services for administrators and security p...
Smart Next Generation Education is a leading EdTech. LEARN MORE NOW
A foundational course covering Zscaler’s Zero Trust Exchange platform fundamentals, essential configurations, and key services for administrators and security p...
Zscaler User & Administrator Fundamentals (EDU-200) is an introductory course that provides learners with a comprehensive overview of the Zscaler Zero Trust Exchange platform. It equips network engineers, IT/security administrators, and professionals with foundational skills in configuring Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and digital experience tools. This course prepares learners for real-world deployment, policy management, and the Zscaler Digital Transformation Administrator certification pathway.
- Introduction
- Zscaler for Users Administrator (EDU 200) Learning Path Structure
- The Need for Digital Transformation
- Traditional Perimeter Network Security Architecture
- Why Perimeter Network Security is no longer effective
- Zero Trust Exchange
- 5 Key Attributes of the Cloud Native Zero Trust Exchange
- Zscaler’s Four Comprehensive and Integrated Solutions
- Zscaler Zero Trust Exchange - Functional Diagram
- Who Uses Zscaler Services?
- Secure Internet & SaaS Access (ZIA)
- Secure Internet & SaaS Access (ZIA)
- Secure Private App Access (ZPA)
- Secure Private App Access (ZPA)
- Zscaler Digital Experience Monitoring (ZDX)
- Zscaler Digital Experience Monitoring (ZDX)
- Recap & Resources
- Zscaler URL Filtering
- Introduction
- Authentication and Authorization
- SAML, SCIM, and OIDC
- Zscaler Identity Services
- Identity Integration
- About ZIdentity
- About ZIdentity
- Getting Started with ZIdentity
00:03:59- Getting Started with ZIdentity
- ZIdentity Administration
- Adding User
- Adding User Groups
- Adding ZIdentity Admin Roles
- Assigning Users/User Groups with Administrative Entitlement
- Adding User Attributes
- Adding Session Attributes
- Assigning users to Service Entitlement
- Assigning Users to an Administrative Entitlement
- Zscaler Experience Center
- Policies and Audit Logs
- Recap & Resources
- Introduction
- Connectivity Services Basics
- Basics of Tunneling
- What is Tunneling?
- PAC Files
- Zscaler PAC File Process
- Zscaler Client Connector
- Understanding the Zscaler Client Connector
- Zscaler Client Connector Key Features
- Zscaler Client Connector Considerations
- ZIA & ZPA Enrollment and Authentication with Zscaler Client Connector
- ZIA & ZPA Enrollment and Authentication with Zscaler Client Connector
- Client Connector Refresh Intervals
- Device Posture
- Posture Check
- High Level Steps for Client Connector Deployments
- Installing Client Connector
- Zscaler Client Connector Configuration
- Troubleshooting and Monitoring Tools
- Zscaler Client Connector UI Demonstration
- Different Forwarding Modes Zscaler Provides Through ZIA
- Different Forwarding Modes Zscaler Provides Through ZIA
- Forwarding Modes: Comparison Table
- ZIA Forwarding Profiles and Proxy
- ZIA Forwarding Profiles and Proxy
- App Connector
- App Connectors
- App Connector Components
- Application Profile
- Application Profile
00:02:38- Deploying App Connectors in Various Environments
- Deploy App Connectors (Video)
- Provisioning Keys
- Deploying App Connectors Process
- Private Application App Connector Demonstration
- Introduction
- Introduction to Zscaler’s Platform Services
- Zscaler Platform Services
- Zscaler Platform Services (Part 2)
- Device Posture
- What is Device Posture?
- How Device Posture Works
- ZIA Posture Profile profiles derived from Device Posture profiles
- Device Posture Evaluation Details
- 5 Key Components of the Device Posture
- Policy Access Control
- Differentiating BYOD and Corporate Devices
- SAML Authentication Response
- SAML Response Attributes
- Trusted Networks
- How to configure a trusted networks using the Zscaler Client Connector
- Browser Access
- TLS/SSL Inspection
- What is TLS/SSL Inspection?
- SSL vs TLS
- Zscaler and TLS Decryption
- Real-World Application of TLS Decryption
- The Growing Importance of TLS Inspection
- TLS Inspection Pillars and Functionalities
- Platform Services TLS Inspection
- A Five-Phase Approach
- Platform Services Deploying TLS Inspection
- Policy Framework
- What is Policy Framework?
- Platform Services Policy Framework Overview
- User Authentication and Policy Configuration in Zero Trust Exchange
- Policy for Zscaler Internet Access
- Policy Framework and Operational Flow in ZIA
- Policy for Internet Access
- Structured Rules and Criteria in Web Proxy Configuration
- Web Proxy Rules
- Security Policy and Firewall Rules in ZIA
- Security Policy and Firewall Rules for Zscaler Internet Access
- Policy Configuration and Actions in Network Address Translation (NAT) and Intrusion Prevention System (IPS)
- Policy Configuration for Zscaler Internet Access
- Policy for Zscaler Private Access
- Private Access Order of Operations
- Policy Access Order of Operations
- Analyzing Access Policy Criteria for ZPA
- Access Policy Criteria for Zscaler Private Access
- Policy for Zscaler Digital Experience
- Policy for Zscaler Digital Experience
- Introduction
- Access Control Services Basics
- URL/ Web Filtering
- Cloud App Control and URL Filtering Overview
- Policy Enforcement Order
- Allow Cascading to URL Filtering
- Cloud App policies & Criteria
- Tenancy Restriction
- URL Filtering
- URL Filtering
- URL Filtering Use Cases
- URL Filtering Policies & Criteria
- File Type Control
- URL Filtering & File Type Control Demo
- Bandwidth Control
- Bandwidth Control
- Bandwidth Control Configurations
- Bandwidth Control Use Cases
- Microsoft 365 (M365)
- Why Microsoft 365 in Access Control Services?
- Traditional Deployment Challenges in Microsoft 365
- Microsoft 365 Network Connectivity Principles
- Optimizing Microsoft 365 with Zscaler
- M365 Best Practices
- Private App Access
Basic familiarity with networking and cybersecurity concepts (recommended).
Access to a computer with reliable internet for eLearning and labs.
Optional: prior study of Zero Trust architecture fundamentals to strengthen foundation.
Understand the architecture and principles of the Zscaler Zero Trust Exchange platform.
Configure core components like ZIA, ZPA, and digital experience monitoring.
Implement connectivity solutions using Client Connector and App Connectors.
Apply basic security policies, access control, and troubleshooting techniques.
Prepare to pursue the ZDTA certification with comprehensive knowledge and practical skills.
Buy Now
Last Updated
Jan 13, 2026
Students
99+
language
English
Duration
10h++Level
beginnerExpiry period
LifetimeCertificate
YesGet exclusive tech courses updates and special offers directly to your inbox.
Complete tech career guide with roadmaps, resources, and insider tips.
This website uses cookies to personalize content and analyse traffic in order to offer you a better experience. Cookie Policy
bigoss
English
Certificate Course
99+ Students
10h++