Training Check Point

Training goals dlearning

code: CP-SBN

This course provides an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology.


Technical professionals who support, install, deploy or administer Check Point Software Blades.


  • Threat Anatomy
    • Discuss the current threat landscape and security challenges.
    • Understand the components of an attack.
    • Learn how threat actors avoid traditional security methods.
    • Understand CPU and OS-level sandbox technologies.
  • SandBlast Threat Emulation
    • Identify the different SandBlast Zero-Day components..
    • Discuss various file emulation processes and mechanisms.
    • Understand the three file emulation deployment options.
  • SandBlast Threat Extraction
    • Understand how SandBlast Zero-Day Protection protects organizations from threats via Threat Extraction.
    • Learn essential Threat Extraction settings and configurations.
  • ThreatCloud Emulation Service
    • Learn how file emulation works when using ThreatCloud.
    • Discuss the different ThreatCloud components.
  • Deployment Scenarios
    • Learn about various SandBlast Zero-Day Protection deployment implementations.
    • Understand how System Administrators can utilize local emulation and/or ThreatCloud in different situations.
  • SandBlast Troubleshooting
    • Identify essential command line tools for monitoring Threat Emulation and Threat Extraction.
    • Learn how to troubleshoot Threat

Conspect Show list

  1. Threat Anatomy
  2. SandBlast Threat Emulation
  3. SandBlast Threat Extraction
  4. ThreatCloud Emulation Service
  5. Deployment Scenarios
  6. SandBlast Troubleshooting

Lab exercises:

  1. Understanding Vulnerabilities
    • Learn about software vulnerabilities.
    • Understand the CVSS scores for vulnerabilities.
    • See how malware can bypass sandboxing.
  2. Working with Threat Emulation
    • Activate local emulation and make the system ready to emulate files.
    • Use the command line to emulate files from the local file system.
    • View Threat Emulation logs using SmartView Tracker.
    • View and create reports using SmartEvent.
    • Confirm the Security Gateway acts as an MTA.
  3. Working with Threat Extraction
    • Activate Threat Extraction on an MTA-enabled Security Gateway.
    • Confirm how Threat Extraction delivers safe content.
  4. Working with ThreatCloud
    • Identify how to configure Security Gateway to offload file emulation to ThreatCloud.
    • Review the related forensic report.
Download conspect training as PDF

Additional information


Persons attending this course should have a:

  • CCSA
  • Basic knowledge of networking
  • 6 months to 1 year of experience with Check Point products recommended
Difficulty level
Duration 1 day

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).


Authorized Check Point Software Technologies Ltd. Trainer.

Other training Check Point | Product and Solutions Training

Training thematically related

IT Security

Network Security

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

860 EUR


Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)



Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit site



Electronic materials

Electronic Materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.



    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment