Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap
Event Overview
Join our virtual hands-on lab to explore Zscaler’s Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler’s modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You’ll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats. Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you’ll be able to view all Zscaler modules and their settings in action
Featured Speakers
What to expect
- • A one-hour virtual workshop focused on prompt engineering for AI and language models.
- • Hands-on lab: Real-time access to AI tools and environments to learn the basics of prompt design and refinement.
- • Introductory Experience: Discuss the benefits of structured prompting compared to ad hoc approaches.
- • Practical Applications: Learn how prompt engineering applies to business, education, and technical use cases.
- • Interactive Q&A: Engage with the host and other participants through live Q&A sessions.
- • Real-world scenarios: Prepare for advanced AI adoption with practical prompt engineering skills.
Goals and Objectives
• Understand the Zscaler Zero Trust Branch platform and its core components (ZIA, ZPA, Branch Connector, Airgap). • Learn how micro-segmentation and least-privilege access reduce risk and prevent lateral movement. • Observe how to configure and manage policies for granular access control. • Explore contractor privileged remote access and branch-to-branch communications. • Gain hands-on experience with the Zscaler Zero Trust Exchange and its unified security methodology.
Who should attend?
Ideal for business professionals, technical teams, and anyone interested in modernizing enterprise security with zero trust principles. No prior experience required; suitable for all skill levels.