0345 4506120

Sandblast Gateway

Technical professionals who support, install, deploy or administer Check Point Software Blades

Provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology

We don't currently have any courses listed for Sandblast Gateway, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Threat Anatomy
• Discuss the current threat landscape and security challenges
• Understand the components of an attack
• Learn how threat actors avoid traditional security methods
• Understand CPU and OS-level sandbox technologies

SandBlast Threat Emulation
• Identify the different SandBlast Zero-Day components
• Discuss various file emulation processes and mechanisms
• Understand the three file emulation deployment options

SandBlast Threat Extraction
• Understand how SandBlast Zero-Day Protection protects organizations from threats via Threat Extraction
• Learn essential Threat Extraction settings and configurations ThreatCloud Emulation Service
• Learn how file emulation works when using ThreatCloud
• Discuss the different ThreatCloud components

Chapter 5: Deployment Scenarios
• Learn about various SandBlast Zero-Day Protection deployment implementations.
• Understand how System Administrators can utilize local emulation and/or ThreatCloud in different situations SandBlast Troubleshooting
• Identify essential command line tools for monitoring Threat Emulation and Threat Extraction
• Learn how to troubleshoot Threat Emulation and Threat Extractioni performance


  • CCSA

Course Content


• Threat Anatomy
• SandBlast Threat Emulation
• SandBlast Threat Extraction
• ThreatCloud Emulation Service
• Deployment Scenarios
• SandBlast Troubleshooting

Understanding Vulnerabilities
• Learn about software vulnerabilities
• Understand the CVSS scores for vulnerabilities
• See how malware can bypass sandboxing

Working with Threat Emulation
• Activate local emulation and make the system ready to emulate files
• Use the command line to emulate files from the local file system
• View Threat Emulation logs using SmartView Tracker
• View and create reports using SmartEvent
• Confirm the Security Gateway acts as an MTA

Working with Threat Extraction
• Activate Threat Extraction on an MTAenabled Security Gateway
• Confirm how Threat Extraction delivers safe content

Working with ThreatCloud
• Identify how to configure Security Gateway to offload file emulation to ThreatCloud
• Review the related forensic report

Exams & Certification

This course prepares delegates for the following exam: 156-730

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Our Customers Include