The Zscaler Deception course is a part of Zscaler's cyberthreat protection solution. It focuses on detecting and stopping active in-network threats that have bypassed other defenses, as well as how Deception uses lures and decoys to detect and disrupt cyberthreats. In this course, you will learn about Deception and its capabilities, benefits, and the problems it solves, as well as key factors driving its adoption.
Learning Outcomes
In this course, you will:

Explain what Zscaler Deception is—challenges it solves, benefits it can deliver, and its unique points of differentiation

Orchestrate automated workflows, notifications, and response rules

Use prebuilt decoys and datasets to deploy effective Deception campaigns

Monitor and analyze attacker activity; gain visibility into credential misuse, entitlement exposures, and privilege escalation in Active Directory

Identify advanced account settings, manage users and roles

Recognize support options and how to access the Help Portal
Get Certified
For any other inquiries, please reach out to [email protected]