Zscaler Zero Trust Cyber Associate (ZTCA)

A comprehensive zero trust cyber credential
Overview

Zscaler Zero Trust Cyber Associate (ZTCA)

Zscaler Zero Trust Cyber Associate (ZTCA), one of the industry’s most comprehensive zero trust certifications, helps network and security professionals attest expertise in establishing a holistic, layered security approach based on zero trust principles.

The ZTCA certification course offers practical guidance on how to deliver effective control and visibility across zero trust initiatives, as well as contrasting zero trust approaches with legacy architectures. Finally, it explores architectural constructs for real-world implementation, including in the context of the Zscaler Zero Trust Exchange™.

BENEFITS

become-a-zero-trust-expert
Become a zero trust expert
grow-your-career-opportunities
Grow your career opportunities
learn-at-your-own-pace
Learn at your own pace

What will you learn?

Through a self-paced e-learning module, the ZTCA course will teach you the essential tenets of the zero trust strategy as you learn how to:

01 Icon
Apply strategic networking and security concepts to implement adaptive trust, reduce the attack surface, and mitigate overall risk
02 Icon
Understand the fundamental components of a zero trust architecture, including verifying identity and context, inspecting all traffic—encrypted or not—and enforcing policy based on a dynamic risk framework
03 Icon
Design and implement network security based on zero trust principles
04 Icon
Implement the seven elements of a highly successful zero trust architecture to mitigate the inadequacies of legacy network and security architectures

About the Course

A new world of digital transformation

Connecting to the Zero Trust Exchange

Section 1: Verify

  • Who is connecting?
  • What is the access context?
  • Where is the connection going?

Section 2: Control

  • Assess risk (adaptive control)
  • Prevent compromise
  • Prevent data loss

Section 3: Enforce

  • Enforce policy

Connecting to the applications

Who should get certified

Who is ZTCA certification for?

Security
Security
  • Security administrators
  • Security engineer/analysts
  • Security architects
  • Security managers
  • Security consultants
  • Cybersecurity analysts
  • CISOs
IT
IT
  • IT auditors
  • System engineers
  • Network/Cloud engineers
  • Enterprise architects
Software
Software
  • DevOps engineers
  • Software developers
Networking
Networking
  • DevOps engineers
  • Software developers

Exam Details

The ZTCA exam is a two-hour online test consisting of 75 multiple choice questions. Your purchase provides one test attempt, which you must use within 12 months.

 

There are no prerequisites to take the ZTCA exam.

 

Exam Code

 

ZTCA

Description

The ZTCA exam will verify the successful candidate has the knowledge and skills required to assess, recommend, and implement core Zscaler zero trust solutions.

Course Details

  • Introduction: An Overview of Zero Trust – 20 minutes
  • Section 1: Verify Identity & Context – 60 minutes
  • Section 2: Control Content & Access – 60 minutes
  • Section 3: Enforce Policy – 60 minutes
  • Summary: Zero Trust Architecture Deep Dive – 40 minutes

Test Format

75 multiple choice questions

Test Duration

120 minutes

Passing Score

80% (60 correct questions)

Languages

English

Price

US$300

CERTIFICATION

Customers and guests

Guests icons
Get started now in Zscaler Cyber Academy
Academy
Don’t have a Zscaler Cyber Academy account?

Partners

zscaler-partner-academy
Get started now in Zscaler Partner Academy
zscaler-partner-academy-account
Don’t have a Zscaler Partner Academy account?

Zero trust glossary

Zero trust is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default. Following a key zero trust principle, least-privileged access, trust is established based on context (e.g., user identity and location, the security posture of the endpoint, the app or service being requested) with policy checks at each step.

Zero trust network access is a set of technologies and functionalities that enable secure access to internal applications for remote users. It operates on an adaptive trust model, where trust is never implicit, with access granted on a least-privileged basis defined by granular policies. ZTNA gives remote users secure connectivity to private apps without placing them on the network or exposing the apps to the internet. ZTNA is also known as the software-defined perimeter (SDP).

A zero trust architecture is a security architecture built to reduce a network's attack surface, prevent lateral movement of threats, and lower the risk of a data breach based on the tenets of the zero trust approach, by which no user or device is ever granted implicit trust. The zero trust puts aside the traditional "network perimeter"—inside of which all devices and users are trusted and given broad permissions—in favor of least-privileged access controls, granular microsegmentation, and multifactor authentication (MFA).

Secure access service edge is a framework defined by Gartner as a way to securely connect entities, such as users and machines, to applications and services from anywhere. SASE combines wide-area networking (WAN) capabilities with security functions such as SWG, CASB, FWaaS, and ZTNA into a single cloud-based solution. The solution is delivered at the “edge” of a distributed cloud architecture, as close as possible to users, for a fast experience with the fewest hops.

 

With many workers remote and off the corporate network, SASE assists organizations in making a secure, seamless transition to the cloud from legacy hardware in data centers while securing access to cloud applications and reducing costs.

The security service edge (SSE), as defined by Gartner, is a convergence of network security services—namely SWG, CASB, and ZTNA—delivered from a purpose-built cloud platform. Where SASE focuses on access services, SSE is a subset of SASE focused squarely on security services.