DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


 

 

    For further information or to schedule for classes, call us at 800-324-2294

     

    in   

    DoD 8570 Training

    The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

    DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

    Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.

    Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:

    Note: The Certifications in red are recently added to approved list as of 2/4/19

      For further information or to schedule for classes, call us at 800-324-2294

      in   
       

      Course Overview:

      Every programmer must keep up with the latest tools and techniques. This course will help you push your skills to the next level and become a more accomplished programmer.  Advanced PERL Programming teaches you all the complex techniques for production-ready PERL programs and explains concepts such as introspection, overriding built-ins, extending PERL's OO model, and testing your code for greater stability.

      Attendees to P-415: Advanced PERL Programming will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      No Events

      Duration: 5 Days

      Course Objectives:

      • Advanced Techniques
      • Parsing Techniques
      • Templating Tools
      • Objects, Databases, and Applications
      • Natural Language Tools
      • PERL and Natural Languages
      • Handling English Text
      • Modules for Parsing English
      • Categorization and Extraction
      • PERL and Unicode
      • POE
      • Programming in an Event-Driven Environment
      • Testing
      • Keeping Tests and Code Together
      • Inline Extensions
      • Just Another PERL Hacker

      Prerequisites:

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

      We are often asked what is the recommended sequence of classes.  Here is our recommended sequence of classes for The Security Field.

      Certified Information Security Manager (CISM)

      CT-325 CompTIA Security+ Arrowright TN-825 Certified Information Security Manager

      Certified Information Systems Auditor(CISA)

      CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-822: Certified Information Systems Auditor (CISA)

      Certified Information Systems Security Professional(CISSP)

      CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-815 CISSP Certification Prep Seminar

       

      Course Overview:

      This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

      Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.

      Date/Locations:

      No Events

      Course Duration: 5 days

      Course Objectives:

      • Advanced Hash Manipulation
      • Command Shell vs. Terminal Access
      • Enumerating Users
      • Exploitation Fundamentals
      • Injection Attacks
      • Legal Issues
      • Metasploit
      • Moving Files with Exploits
      • Obtaining and Passing Password Representations
      • Overview of Passwords
      • Penetration Testing Foundations
      • Penetration Testing Process
      • Penetration Testing via the Command Line
      • Profiling the Target
      • Reconnaissance
      • Scanning for Targets
      • Using a Proxy to Attack a Web Application
      • Vulnerability Scanning
      • Wireless Crypto and Client Attacks
      • Wireless Fundamentals

      Course Prerequisites:

      • GSEC or equivalent experience
      • UNIX, Windows, networking, and security experience
      • This is a hands-on skill course requiring comfort with command line interaction and network communications

      Comments

      Latest comments from students



      User: kdwagoner

      Instructor comments: Very knowledgeable. Kept class focused and on task

      Facilities comments: Good


      Liked the class?  Then let everyone know!