Coming soon!
Zscaler Code Blue
An active intrusion is unfolding across a modern, hybrid environment. Investigate suspicious access, analyze web and SaaS traffic, and contain movement into private applications without disrupting work. Apply Zero Trust access with ZIA and ZPA, validate findings in packet captures with Wireshark, and use Ghidra to confirm binary‑level indicators before closing the case.
Blue
•10 teams
•4 hrs
•Intermediate
Scenario