hands-on lab

Building Zero Trust for Cloud Workloads

Welcome to the “Zero Trust Cloud” hands-on lab!

Zscaler Zero Trust Cloud allows you to securely connect applications anywhere to minimize the attack surface, prevent lateral movement, and reduce the risk of bad actors gaining access to your data by leveraging a zero trust architecture for effective workload security.

Our Platform

Connecting workloads to the internet across different networks doesn't have to be difficult

Zscaler Zero Trust Cloud is a cloud native zero trust access service that provides a fast, simple, and safe approach to app-to-app and app-to-internet connectivity across multicloud environments.

Integrated, automated connectivity and security from Zscaler reduces complexity and cost with a smarter, more efficient, and more secure alternative to legacy network solutions.

Overview

Zero Trust Cloud Overview

Learn how to navigate and set up Zscaler Zero Trust Cloud to start securing your workloads.

Dashboard and Navigation
Dashboard and Navigation

Explore the Cloud Connector Portal, where you can access and manage your Cloud Connectors and policies.

Provisioning and Template Management
Provisioning and Template Management

Examine how you can use location and provisioning templates to register your Cloud Connectors and start securing your cloud workloads.

Traffic Forwarding
Traffic Forwarding

Discover how to easily configure workload traffic policies.

Analytics and Logging
Analytics and Logging

Walk through how you can gain greater insight into your workload traffic.

In Action

Zero Trust Cloud in Action

Examine various cyberthreat prevention use cases for Zscaler Zero Trust Cloud.

Enforcing Minimum TLS Versions
Enforcing Minimum TLS Versions

Learn how to set up policies to enforce minimum TLS versions to secure cloud workloads.

Protecting Against Malicious Payloads, Phishing, and Botnets
Protecting Against Malicious Payloads, Phishing, and Botnets

See the comprehensive protection Zscaler Zero Trust Cloud offers right out of the box.

Enforcing a Data Loss Prevention Policy
Establishing a Data Loss Prevention Policy

Discover the power of Zscaler Data Loss Prevention to protect against data exfiltration.

Controlling Access to Specific Resources on Websites
Controlling Access to Specific Resources on Websites

Walk through how you can gain granular control over access to specified websites.

Zero Trust Cloud - AWS Tagging
Zero Trust Cloud - AWS Tagging

Discover how to implement policy using AWS tagging for Zero Trust Cloud.

Zero Trust Cloud - VDI Agent
Zero Trust Cloud - VDI Agent

Examine the VDI agent for Zero Trust Cloud.

Zero Trust Cloud - AWS Auto Scale Group
Zero Trust Cloud - AWS Auto Scale Group

See how the AWS auto scale functionality enhances Zscaler Zero Trust Cloud.

Test-drive zero trust in AWS

Access a live environment where you can watch our demos on demand. You should receive your access credentials within 72 hours of your request.