Zscaler Zero Trust Cyber Associate (ZTCA)
Zscaler Zero Trust Cyber Associate (ZTCA)
Zscaler Zero Trust Cyber Associate (ZTCA), one of the industry’s most comprehensive zero trust certifications, helps network and security professionals attest expertise in establishing a holistic, layered security approach based on zero trust principles.
The ZTCA certification course offers practical guidance on how to deliver effective control and visibility across zero trust initiatives, as well as contrasting zero trust approaches with legacy architectures. Finally, it explores architectural constructs for real-world implementation, including in the context of the Zscaler Zero Trust Exchange™.
BENEFITS

Become a zero trust expert

Grow your career opportunities

Learn at your own pace
What will you learn?
Through a self-paced e-learning module, the ZTCA course will teach you the essential tenets of the zero trust strategy as you learn how to:

Apply strategic networking and security concepts to implement adaptive trust, reduce the attack surface, and mitigate overall risk

Understand the fundamental components of a zero trust architecture, including verifying identity and context, inspecting all traffic—encrypted or not—and enforcing policy based on a dynamic risk framework

Design and implement network security based on zero trust principles

Implement the seven elements of a highly successful zero trust architecture to mitigate the inadequacies of legacy network and security architectures
Who should get certified
Who is ZTCA certification for?

Security
- Security administrators
- Security engineer/analysts
- Security architects
- Security managers
- Security consultants
- Cybersecurity analysts
- CISOs

IT
- IT auditors
- System engineers
- Network/Cloud engineers
- Enterprise architects

Software
- DevOps engineers
- Software developers

Networking
- DevOps engineers
- Software developers
Exam Details
The ZTCA exam is a two-hour online test consisting of 75 multiple choice questions. Your purchase provides one test attempt, which you must use within 12 months.
There are no prerequisites to take the ZTCA exam.
Partners

Get started now in Zscaler Partner Academy

Don’t have a Zscaler Partner Academy account?
Zero trust glossary
Zero trust is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default. Following a key zero trust principle, least-privileged access, trust is established based on context (e.g., user identity and location, the security posture of the endpoint, the app or service being requested) with policy checks at each step.
Zero trust network access is a set of technologies and functionalities that enable secure access to internal applications for remote users. It operates on an adaptive trust model, where trust is never implicit, with access granted on a least-privileged basis defined by granular policies. ZTNA gives remote users secure connectivity to private apps without placing them on the network or exposing the apps to the internet. ZTNA is also known as the software-defined perimeter (SDP).
A zero trust architecture is a security architecture built to reduce a network's attack surface, prevent lateral movement of threats, and lower the risk of a data breach based on the tenets of the zero trust approach, by which no user or device is ever granted implicit trust. The zero trust puts aside the traditional "network perimeter"—inside of which all devices and users are trusted and given broad permissions—in favor of least-privileged access controls, granular microsegmentation, and multifactor authentication (MFA).
Secure access service edge is a framework defined by Gartner as a way to securely connect entities, such as users and machines, to applications and services from anywhere. SASE combines wide-area networking (WAN) capabilities with security functions such as SWG, CASB, FWaaS, and ZTNA into a single cloud-based solution. The solution is delivered at the “edge” of a distributed cloud architecture, as close as possible to users, for a fast experience with the fewest hops.
With many workers remote and off the corporate network, SASE assists organizations in making a secure, seamless transition to the cloud from legacy hardware in data centers while securing access to cloud applications and reducing costs.
The security service edge (SSE), as defined by Gartner, is a convergence of network security services—namely SWG, CASB, and ZTNA—delivered from a purpose-built cloud platform. Where SASE focuses on access services, SSE is a subset of SASE focused squarely on security services.