37,500.00$

  • Duration: 1 Day

This workshop objective is to provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology.

Objectives

Threat Anatomy:

• Discuss the current threat landscape and security challenges

.• Understand the components of an attack.

• Learn how threat actors avoid traditional security methods

.• Understand CPU and OS-level sandbox technologies.SandBlast

Threat Emulation:

• Identify the different SandBlast Zero-Day components..

• Discuss various file emulation processes and mechanisms

.• Understand the three file emulation deployment options.

SandBlast Threat Extraction:

• Understand how SandBlast Zero-Day Protection protects organizations from threats via Threat Extraction.

• Learn essential Threat Extraction settings and configurations.

ThreatCloud Emulation Service:

• Learn how file emulation works when using ThreatCloud.

• Discuss the different ThreatCloud components.

 Deployment Scenarios:

• Learn about various SandBlast Zero-Day Protection deployment implementations.

• Understand how System Administrators can utilize local emulation and/or ThreatCloud in different situations.

SandBlast Troubleshooting:

• Identify essential command line tools for monitoring Threat Emulation and Threat Extraction.

• Learn how to troubleshoot Threat Emulation and Threat Extractioni performance.

Course Content

• Threat Anatomy

• SandBlast Threat Emulation

• SandBlast Threat Extraction

• ThreatCloud Emulation Service

• Deployment Scenarios

• SandBlast Troubleshooting.

This workshop objective is to provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology.

There are no reviews yet.

Be the first to review “SANDBLAST ZERO-DAY PROTECTION – WORKSHOP”