Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

دانلود کتاب Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

53000 تومان موجود

کتاب Zscaler Cloud Security Essentials: نحوه استفاده ایمن از کارایی، هوش و چابکی ابر را با Zscaler کشف کنید نسخه زبان اصلی

دانلود کتاب Zscaler Cloud Security Essentials: نحوه استفاده ایمن از کارایی، هوش و چابکی ابر را با Zscaler کشف کنید بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 7


توضیحاتی در مورد کتاب Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

نام کتاب : Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
عنوان ترجمه شده به فارسی : Zscaler Cloud Security Essentials: نحوه استفاده ایمن از کارایی، هوش و چابکی ابر را با Zscaler کشف کنید
سری :
نویسندگان :
ناشر : Packt Publishing
سال نشر : 2021
تعداد صفحات : 236
ISBN (شابک) : 1800567987 , 9781800567986
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover
Title page
Copyright and Credits
Dedication
Contributors
Table of Contents
Preface
Section 1: Zscaler for Modern Enterprise Internet Security
Chapter 1: Security for the Modern Enterprise with Zscaler
Fundamental definitions in security
Active Directory
Authentication
Bad actors
Bandwidth
Certificate
DLP
DNS
Firewall
FTP
Identity Provider
Intrusion Prevention System
Kerberos
Logging
Malware
PAC file
SAML
Sandbox
Secure Web Gateway
Secure Sockets Layer/Transport Layer Security
Surrogate IP
Tunnel
VPN
XFF
Understanding the evolution of the modern enterprise and its workforce
Evolution of the workforce
Enterprise infrastructure evolution
Exploring the need for scalable, cloud-based security
Workforce evolution requirements
Enterprise preferences
Scalable, highly available, cloud-based solutions
Internet security for everyone
Using Zscaler Internet Access for a safe and secure internet experience
Why safe internet?
How ZIA works
Using Zscaler Private Access for secure application access
What is Private Access?
How ZPA works
ZCC
Summary
Questions
Chapter 2: Understanding the Modular Zscaler Architecture
Introducing the Zscaler cloud architecture
SSMA
High availability and redundancy
Understanding the CA – where the core resides
Admin Portal
Using Zscaler PSEs – where the policies are applied and enforced
SSL inspection
Virtual Service Edge (formerly called Virtual ZEN or VZEN)
Monitoring user and application activity using Nanolog clusters
Nanolog Streaming Service (NSS)
Protecting enterprise users and infrastructure with Sandbox
Understanding the need for a sandbox
Cloud Sandbox configuration options
Summary
Questions
Further reading
Chapter 3: Delving into ZIA Policy Features
Technical requirements
Understanding the ZIA Web policy
Security
Access Control
DLP
Exploring the ZIA Mobile policy
Zscaler Client Connector Configuration
Zscaler Mobile Security
Zscaler Mobile Access Control
Learning about the ZIA Firewall policy
Firewall Control
NAT Control Policy
DNS Control
FTP Control
IPS Control
Order of policy enforcement
Summary
Questions
Further reading
Chapter 4: Understanding Traffic Forwarding and User Authentication Options
Technical requirements
Understanding traffic forwarding
GRE tunnel forwarding
IPsec tunnel forwarding
Creating GRE or IPsec locations
PAC file forwarding
Exploring ZCC internet traffic forwarding
ZCC internet access forwarding scenarios
ZCC internet access forwarding options
ZCC silent authentication
ZCC ZIA process flow
Evaluating user authentication options
Benefits of user authentication
Surrogate IP
User provisioning
User authentication process flow
User authentication options
Summary
Questions
Further reading
Chapter 5: Architecting and Implementing Your ZIA Solution
Analyzing the security posture of the enterprise
Zscaler question set
Creating a customized ZIA solution for the enterprise
Traffic forwarding
User authentication
Policy
Implementing the ZIA solution across the enterprise
Planning
Configuration
Pilot rollout
Production rollout
Summary
Questions
Further reading
Chapter 6: Troubleshooting and Optimizing Your ZIA Solution
Technical requirements
Setting up proactive ticketing and alerts
ZIA alerts
ZIA ticketing
Producing reports for management review
System-defined reports
Insights
Generating custom widgets for the ZIA Dashboard
Editing current widgets
Adding new widgets
Creating a unified ZIA troubleshooting guide
Basic troubleshooting
Advanced troubleshooting
End users are unable to access websites
End users get a Website Blocked error
The ZCC App displays a Captive Portal Fail Open Error message
The ZCC App shows a Network Error message
The ZCC App displays an Internal Error message
The ZCC App exhibits a Connection Error message
The ZCC App has a Local FW/AV Error message
The ZCC App shows a Driver Error message
User authentication errors
Users are unable to upload or download files
Slow website response
URL formatting
Application SSL inspection
Application authentication
Summary
Questions
Further reading
Section 2: Zero-Trust Network Access (ZTNA) for the Modern Enterprise
Chapter 7: Introducing ZTNA with Zscaler Private Access (ZPA)
What is ZTNA and how does ZPA fit in to this?
ZTNA core principles
Why is ZTNA needed?
ZPA security principles
Delving into the ZPA architecture
ZPA CA
ZPA PSEs
ZCC application
App Connectors
Z tunnels
Microtunnels
Logging and analytics cluster
LSS
Exploring clientless ZPA solutions
Understanding the Zscaler Cloud Connector ZPA solution
Delving into the BA ZPA solution
Questions
Further reading
Chapter 8: Exploring the ZPA Admin Portal and Basic Configuration
Navigating around the ZPA Admin Portal
ZPA dashboards
ZPA administration
Configuring the ZPA log servers for activity insights
Integrating with Azure AD and Okta for SSO
Adding an IdP
Configuring the ZCC app for ZPA
ZCC app installation
ZCC app enrollment and authentication
ZPA application access
Device posture control
ZPA process flow
Summary
Questions
Further reading
Chapter 9: Using ZPA to Provide Secure Application Access
Deploying App Connectors
Connector requirements
Installing the connector
Connector updates
Connector provisioning
Configuring ZPA applications
DNS search domains
Adding an application segment
Configure SAML attributes
Configuring end user access policies
Application health monitoring
Exploring the best practices for enterprise deployments
App Connectors
Certificates
Authentication
ZCC app
Application
Monitoring
Log streaming service
Summary
Questions
Further reading
Chapter 10: Architecting and Troubleshooting Your ZPA Solution
Architecting your ZPA solution
Stepping through the ZPA Question Set
Inventory of existing applications
Discovering end user access
Pilot rollout
Expanded rollout
Final rollout
Troubleshooting your ZPA solution
Unable to access a service due to a captive portal error
Unable to access a service due to a network error
Unable to access a service due to an internal error
Unable to access a service due to a connection error
Unable to access a service due to a local FW/AV error
Unable to access a service due to a driver error
Unable to access a private application/service due to an unauthenticated error
Unable to access a private application/service
Unable to access any application/service
Unable to authenticate due to a SAML transit error
Unable to authenticate due to a SAML account error
Unable to authenticate due to a SAML format error
Summary
Questions
Further reading
Assessments
Chapter 1 – Security for the Modern Enterprise with Zscaler
Chapter 2 – Understanding the Modular Zscaler Architecture
Chapter 3 – Delving into ZIA Policy Features
Chapter 4 – Understanding Traffic Forwarding and User Authentication Options
Chapter 5 – Architecting and Implementing Your ZIA Solution
Chapter 6 – Troubleshooting and Optimizing Your ZIA Solution
Chapter 7 – Introducing ZTNA with Zscaler Private Access (ZPA)
Chapter 8 – Exploring the ZPA Admin Portal and Basic Configuration
Chapter 9 – Using ZPA to Provide Secure Application Access
Chapter 10 – Architecting and Troubleshooting Your ZPA Solution
Why subscribe?
About Packt
Other Books You May Enjoy
Index




پست ها تصادفی