About the Course
This course provides an overview of how Zscaler Deception uses lures and decoys to detect and disrupt cyberthreats that bypass traditional defenses, intended for technical individuals responsible for proposing, architecting, deploying, and supporting the solution. You will dive into the capabilities, benefits, and use cases of Zscaler Deception, as well as gain insight into its unique differentiators.
Learning Outcomes

Explain what Zscaler Deception is and how it works

Describe the value of Deception, including the challenges it solves and its benefits

Identify Zscaler Deception's unique points of differentiation

Understand how to monitor and analyze attackers’ activities

Orchestrate automated workflows, notifications, and response rules

Use prebuilt decoys and datasets to deploy effective Deception campaigns

Gain visibility into credential misuse, entitlement exposures, and privilege escalation activities in Active Directory

Identify advanced account settings as well as user and role management

Understand support options and how to access the help portal
Learning Journey Map
EDU-238 Learning Journey Map
The recommended path for the Deception learning journey is to complete the e-learning course and then take the hands-on labs. Once these are completed, you can sign up for the certificate test. You will have 45 minutes to answer its 20 questions, with 3 re-tests. Upon passing the test, you’ll earn the Deception Certificate.

If you are new to the space, start with Foundation Courses.
Otherwise, start with EDU-200 within the Platform learning paths.
Once you complete the baseline learning path (EDU-200), you can progress in the Platform courses or take on the specialization courses.
Our Learning Path
Access Cyber Academy