Professional Documents
Culture Documents
Introduction
Introduction
Learning Objectives
EXPECTATION S
Course Duration
Expectations
IN TR ODUCTION TO ZIA
ZIA: Overview
Role of ZIA
Bene ts of ZIA
SUMMAR Y
Recap
Section 1 of 10
Introduction
C O NT I NU E
Section 2 of 10
Learning Objectives
Course Duration
You will need eight hours to complete this course. However, for ease of
learning, the course is divided into 11 modules followed by an exam. You can
take the modules individually or in a sequence.
Every module is set up in the form of scrollable web pages. In each module,
the rst section introduces you to the concepts discussed in the module.
C O NT I NU E
Section 4 of 10
Expectations
C O NT I NU E
Section 5 of 10
While optional, completing all 11 modules of this learning journey will prepare
you for the ZIA Administrator Certi cation Exam. You must pass the exam
with a 75% or higher score to become certi ed.
C O NT I NU E
Section 6 of 10
ZIA: Overview
What is ZIA?
Role of ZIA
ZIA provides a full security stack to protect your end users and road warriors
from internet-based threats.
Select play to watch the video below to understand how ZIA o ers internet
and web security.
Select here for a transcript of the video –
This is your business. You need to keep your data safe and your users happy.
In the past, the focus was on your network where your applications lived. So,
you used a hub-and-spoke architecture to connect your users to your
applications. Your datacenter was the center of gravity and all tra c owed
there. As internet tra c increased, you created an outbound gateway to
establish a perimeter to protect your network, and as threat complexity
increased, you invested in more appliances to keep your network safe. But all
those appliances are costly and backhauling your tra c makes the user
experience terrible. And in a cloud- rst world, are you any safer? Your
applications have moved to the cloud and your users are mobile. So, user
connections are now following the path of least resistance. The internet is the
new corporate network, and the cloud is the new center of gravity. Your
security perimeter has evaporated, and your network protection model is
broken.
So now, you're here, learning how Zscaler can replace your appliances with a
cloud platform that transforms your approach to security. You see, inside our
cloud platform, we've built a complete security stack as a service. It's called
Zscaler Internet Access and it provides full inline content inspection, even hard
to inspect SSL tra c. Because our purpose-built cloud always places security
close to the user, you get a fast, secure experience regardless of location.
More importantly, users get identical protection no matter where they
connect from. So, when you're faced with the challenge of your CEO and
executives hitting the road, that same airtight security follows them to keep
their data safe and connections lightning fast. And when we nd a threat
anywhere, we block it everywhere within seconds. We call all this the cloud
e ect, and it makes you safer than appliances.
In short, Zscaler is a complete security stack as a service that goes
everywhere your users go—all without the cost, complexity, and
performance concerns you get with appliances. To keep your business safe in
today's cloud- rst world, all you need to do is point your internet-bound
tra c to Zscaler and we'll do the rest. We will make sure nothing bad comes
in and nothing good leaves. It's that simple. Whether you want to uplevel
your security or break free from appliances altogether, Zscaler can transform
the way you protect users. Learn more at Zscaler.com.
Select play to watch the video below to learn what ZIA does.
Select here for a transcript of the video –
ZIA, o ered as a SaaS platform, replaces legacy network security solutions
with a comprehensive zero trust approach.
ZIA provides AI-powered protection from ransomware, zero-day malware,
and advanced attacks based on threat intelligence, thereby allowing your
users to work from anywhere using the internet as the corporate network. Its
direct-to-cloud architecture improves your organization's performance and
user experience and simpli es its network administration.
An organization can forward its tra c to any ZIA Public Service Edge in the
world or use the advanced geo-IP resolution capability of Zscaler to direct its
users' tra c to the nearest ZIA Public Service Edge. When a user moves to a
di erent location, the policy follows the user, with the ZIA Public Service Edge
downloading the appropriate policy.
In this way, you can secure your workforce with ZIA.
C O NT I NU E
Section 8 of 10
Bene ts of ZIA
Connectivity –
Security –
Value –
Simplicity –
C O NT I NU E
Section 9 of 10
Select each tab below to learn about the use cases of ZIA:
Recap
In Summary
This module has helped you identify the structure of the ZIA Administrator course.
You now have a better understanding of ZIA features and their bene ts, and the key use cases. You
are also familiarized with the Zscaler Zero Trust Exchange platform, which enables fast, secure
connections and allows your employees to work from anywhere using the internet as the corporate
network.
C O NT I NU E
Thank You!