Course Overview:
TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam. The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.
This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try. We encourage our students to take the exam within a week after course completion. The goal for this course is a pass rate of one and done. Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days. TechNow has a proven CISSP track record that you can depend on.
Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 10 Days
Course Objectives:
Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communications and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Prerequisites:
To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:
- 4 years of experience in the information security field
- or 3 years experience & a college degree
Contact TechNow to verify that you qualify.
Comments
Latest comments from students
Facilities comments:
User: pulliamp
Instructor comments:
Liked the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
TechNow has been involved in enterprise security architectures and education since 1990. TechNow’s training program has followed the evolution of enterprise computing into security architectures. Palo Alto Networks represents the current state of security product evolution. With next generation firewall technology, the reunification of your security architecture is possible. TechNow can present the ramifications of many centralized strategies. All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
Palo Alto Networks Certifications: Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take EDU-201 + EDU-205 + EDU-221
TechNow is a mobile Pearson VUE Authorized Testing Center. Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course. Take the course and get certfied, without logistical effort of getting students to a training facility and the hassle of scheduling testing.
TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do. While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course. His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.
A large percentage of training is moving to the virtualized/remote lab environments. Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs. There were either network connectivity issues, or issues with the remote access software, or other problems. The whole training experience was very frustrating and not productive.
We keep our labs open to students if they would like after hours, or before hours access. Repeatedly going through a lab engrains that knowledge for later recall. Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port. There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration. These disaster scenarious requires hands-on physical access to hardware. Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.
Course Overview:
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- VoIP Architecture
- VoIP Signaling and media protocols
- Common VoIP authentication mechanisms
- Common VoIP encryption techniques
- VoIP protocol analysis with Wireshark
- Maintaining QoS while mitigating DoS
- VoXML, XML, and application integration security
- Converged network security design and implementation
- Impact of NAT and firewalls
- SIP, H.323, and MGCP vulnerabilities
- VPN, IPsec and SRTP to secure VoIP services
- Penetration testing with open source tools
- Attacks for Eavesdropping, call redirection, and DoS
- Design of hacked firmware virtualization layer
- Concise lockdown steps for network hardware and VoIP
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- As well as an understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!