![desktop hero](/_next/image?url=%2Fassets%2Fimages%2Fhero%2Fblue.png&w=1920&q=75)
Browser Isolation (EDU-233)
Security Architect, Information Protection Analyst/Engineer/Architect, Risk & Compliance Analyst, IT/Security/Network Operator
Course Summary
Keep users safe and productive
Ensure secure access and protect critical business data with Zscaler Browser Isolation. This course explores how web content is isolated in containerized browsers, providing granular control over isolation and enhancing data exfiltration security.
Learning Outcomes
![identify-modern-day-cybersecurity-and-data-loss-challenges](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Fidentify-modern-day-cybersecurity-and-data-loss-challenges.png&w=128&q=75)
Identify modern-day cybersecurity and data loss challenges
![understand-how-browser-isolation](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Funderstand-how-browser-isolation.png&w=128&q=75)
Understand how Browser Isolation helps enhance protection and boost productivity
![describe-browser-isolation-and-its-key-features](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Fdescribe-browser-isolation-and-its-key-features.png&w=128&q=75)
Describe Browser Isolation and its key features
![list-the-cyberthreat-and-data-loss-protection-use-cases-browser-isolation-addresses](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Flist-the-cyberthreat-and-data-loss-protection-use-cases-browser-isolation-addresses.png&w=128&q=75)
List the cyberthreat and data loss protection use cases Browser Isolation addresses
![describe-how-to-configure-the-isolation-profiles-and-policies-in-zia-and-zpa](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Fdescribe-how-to-configure-the-isolation-profiles-and-policies-in-zia-and-zpa.png&w=128&q=75)
Describe how to configure the isolation profiles and policies in ZIA and ZPA
![explain-how-user-portal-2.0-secures-web-based-access](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Fexplain-how-user-portal-2.0-secures-web-based-access.png&w=128&q=75)
Explain how User Portal 2.0 secures web-based access to SaaS and private applications for BYOD/unmanaged endpoints
![identify-the-isolation-browser-experience-for-zia-and-zpa-users](/_next/image?url=https%3A%2F%2Fwww.zscaler.com%2Fsites%2Fdefault%2Ffiles%2FcolumnsIconsModuleCard%2Fidentify-the-isolation-browser-experience-for-zia-and-zpa-users.png&w=128&q=75)
Identify the isolation browser experience for ZIA and ZPA users