About the Course

Explore foundational principles of risk management, including threat identification, assessment, and mitigation, with insights into Zscaler Risk360. Delve into the capabilities and use cases of advanced solutions such as Unified Vulnerability Management (UVM), External Attack Surface Management (EASM), Deception, Identity Threat Detection and Response (ITDR), and Breach Predictor.

You will also learn how the Zscaler Data Fabric and UVM revolutionize vulnerability management, and how Zscaler’s AI powered products help enhance an organization's security posture.

Course outline

Prerequisites

Basic knowledge of Cybersecurity

Learning Path

Certificate

A certificate is awarded upon successful completion of: 

  • Security Operations (EDU-250) e-learning course (5 hours)
  • Hands-on lab (4 hours)
  • Test (30 mins)

Resources

Visit Zscaler Cyber Academy for more information

Delivery formats

Hybrid: 5-hour e-learning course + 4-hour lab (virtual/in-person)

Target Audience

Network Engineers and Security Administrators

Learning Outcomes

core-principles
Explain the core principles and importance of cyber risk management in today's digital landscape
security-operations
Understand Security Operations platform offerings
risk-factors
Identify key risk factors impacting an organization's security posture using Risk360
Analyze
Analyze comprehensive risk insights using the Zscaler Data Fabric for Security
zscaler-uvm
Explain how Zscaler UVM enhances the organization's vulnerability assessment and remediation processes
strategic-benefits
Describe the strategic benefits of Zscaler EASM
zscaler-deception-technology
Recognize the strategic importance of deploying Zscaler Deception technology
Zscaler-itdr
Explain the role of Zscaler ITDR in enhancing detection and mitigation of identity-based threats
security-breaches
Identify potential future security breaches using Zscaler Breach Predictor
Implement advanced-vulnerability
Implement advanced vulnerability management techniques using Zscaler UVM
develop-strategies
Develop strategies for continuous monitoring and management of the external attack surface using EASM
integrate-itdr
Integrate ITDR capabilities with other security solutions for a comprehensive defense strategy
proactive defense-mechanisms
Develop proactive defense mechanisms based on breach prediction insights and scenarios

Learning Journey Map

EDU-250 Learning Journey Map

The recommended path for the Security Operations learning journey is to complete the e-learning course, and then take the hands-on labs. Once you complete these, you can sign up for the certificate test. You will have 20 minutes to answer its 10 questions, with up to three re-tests. Upon passing the test, you’ll earn the Security Operations certification.

edu-250-learning-journey-map
ENLARGE
01

If you are new to the space, start with Foundation Courses.

02

Otherwise, start with EDU-200 within the Platform learning paths.

03

Once you have completed the baseline learning path (EDU-200), you can them progress higher within the Platform courses or take on the specialization courses.

Our Learning Path

Security Operations (EDU-250) Learning Path
risk-management-portfolio-edu-250
ENLARGE

Access Cyber Academy

Jump into Zscaler Cyber Academy

For any other inquiries, please reach out to [email protected].