This workshop objective is to provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology.
- Sorry, this product cannot be purchased.
37,500.00$
- Duration: 1 Day
Threat Anatomy:
• Discuss the current threat landscape and security challenges
.• Understand the components of an attack.
• Learn how threat actors avoid traditional security methods
.• Understand CPU and OS-level sandbox technologies.SandBlast
Threat Emulation:
• Identify the different SandBlast Zero-Day components..
• Discuss various file emulation processes and mechanisms
.• Understand the three file emulation deployment options.
SandBlast Threat Extraction:
• Understand how SandBlast Zero-Day Protection protects organizations from threats via Threat Extraction.
• Learn essential Threat Extraction settings and configurations.
ThreatCloud Emulation Service:
• Learn how file emulation works when using ThreatCloud.
• Discuss the different ThreatCloud components.
Deployment Scenarios:
• Learn about various SandBlast Zero-Day Protection deployment implementations.
• Understand how System Administrators can utilize local emulation and/or ThreatCloud in different situations.
SandBlast Troubleshooting:
• Identify essential command line tools for monitoring Threat Emulation and Threat Extraction.
• Learn how to troubleshoot Threat Emulation and Threat Extractioni performance.
• Threat Anatomy
• SandBlast Threat Emulation
• SandBlast Threat Extraction
• ThreatCloud Emulation Service
• Deployment Scenarios
• SandBlast Troubleshooting.
This workshop objective is to provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology.
There are no reviews yet.