The Zscaler Deception course is a part of Zscaler's cyberthreat protection solution. It focuses on detecting and stopping active in-network threats that have bypassed other defenses, as well as how Deception uses lures and decoys to detect and disrupt cyberthreats. In this course, you will learn about Deception and its capabilities, benefits, and the problems it solves, as well as key factors driving its adoption.
Explain what Zscaler Deception is—challenges it solves, benefits it can deliver, and its unique points of differentiation
Orchestrate automated workflows, notifications, and response rules
Use prebuilt decoys and datasets to deploy effective Deception campaigns
Monitor and analyze attacker activity; gain visibility into credential misuse, entitlement exposures, and privilege escalation in Active Directory
Identify advanced account settings, manage users and roles
Recognize support options and how to access the Help Portal
Customers
Partners
Public Sector
For any other inquiries, please reach out to [email protected]