Table of Contents
- Security for the Modern Enterprise with Zscaler
- Understanding the modular Zscaler Architecture
- Delving into ZIA Policy Features
- Understanding Traffic Forwarding and User Authentication Options
- Architecting and Implementing Your ZIA solution
- Troubleshooting and Optimizing your ZIA solution
- Introducing ZTNA with Zscaler Private Access (ZPA)
- Using ZPA to provide secure application access
- Transitioning your business applications to ZPA
- Architecting and Implementing your ZPA solution

