About the Course
This course provides an overview of how Zscaler Deception uses lures and decoys to detect and disrupt cyberthreats that bypass traditional defenses, intended for technical individuals responsible for proposing, architecting, deploying, and supporting the solution. You will dive into the capabilities, benefits, and use cases of Zscaler Deception, as well as gain insight into its unique differentiators.
Learning Outcomes
Explain what Zscaler Deception is and how it works
Describe the value of Deception, including the challenges it solves and its benefits
Identify Zscaler Deception's unique points of differentiation
Understand how to monitor and analyze attackers’ activities
Orchestrate automated workflows, notifications, and response rules
Use prebuilt decoys and datasets to deploy effective Deception campaigns
Gain visibility into credential misuse, entitlement exposures, and privilege escalation activities in Active Directory
Identify advanced account settings as well as user and role management
Understand support options and how to access the help portal
Learning Journey Map
EDU-238 Learning Journey Map
The recommended path for the Deception learning journey is to complete the e-learning course and then take the hands-on labs. Once these are completed, you can sign up for the certificate test. You will have 45 minutes to answer its 20 questions, with 3 re-tests. Upon passing the test, you’ll earn the Deception Certificate.

If you are new to the space, start with Foundation Courses.
Otherwise, start with EDU-200 within the Platform learning paths.
Once you complete the baseline learning path (EDU-200), you can progress in the Platform courses or take on the specialization courses.
Our Learning Path
Access Cyber Academy


