Course Overview:

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

What’s Included:

  • 5 days of instructor-led in classroom training
  • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
  • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
  • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
  • CHFI Courseware
  • Exam Voucher
  • CHFI onsite exam scheduling

Course Objectives:

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
  • Identify & check the possible source/ incident origin
  • Recover deleted files and partitions in Windows, MAC OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Dates/Locations:

No Events

Duration: 5 Days

Course Content:

    • Module 01. Computer Forensics in Today’s World
    • Module 02. Computer Forensics Investigation Process
    • Module 03. Understanding Hard Disks and File Systems
    • Module 04. Data Acquisition and Duplication
    • Module 05. Defeating Anti-forensics Techniques
    • Module 06. Operating System Forensics (Windows, Mac, Linux)
    • Module 07. Network Forensics
    • Module 08. Investigating Web Attacks
    • Module 09. Database Forensics
    • Module 10. Cloud Forensics
    • Module 10. Malware Forensics
    • Module 11. Investigating Email Crimes
    • Module 12. Investigating Email Crimes
    • Module 13. Mobile Forensics
    • Module 14. Forensics Report Writing and Presentation

 

Prerequisites:

      • 2+ years of proven information security work experience
      • Educational background with digital security specialization

    Target Audience:

      • Law Enforcement
      • Defense & Military
      • E-Business Security
      • Systems Administrators
      • Legal Professionals
      • Banking & Insurance professionals
      • Government Agencies
      • IT Managers

  • Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

 

Course Overview:

This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.

Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.

Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.

Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

• Virtual Infrastructure Overview
• ESX and ESXi Server Installation
• Configuration of Networking, Scalability and Security
• Storage
• Install and Configure vCenter Server and Components
• Creation, Deployment, Management, and Migration of Virtual Machines
• Utilize vCenter Server for Resource Management
• Utilize vCenter Server for Virtual Machine Access Control and User Managment
• Use vCenter Server to increase scalability
• Monitoring Your Environment
• Data & Availability Protection Troubleshooting
• Use VMware vCenter Update Manager to apply ESXi patches
• Use vCenter Server to manage vMotion, HA, DRS and data protection.

Course Overview:

TechNow’s Course provides existing .NET developers with practical information and labs that enables them to build solutions on the Microsoft SharePoint 2010/2013 platform.

Attendees to MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Introduction to SharePoint 2010/2013 Development Platform
  • Using SharePoint 2010/2013 Developer Tools
  • Developing SharePoint 2010/2013 Web Parts
  • Working with SharePoint Objects on the Server
  • Creating Event Receivers and Application Settings
  • Developing Solutions by Using Business Connectivity Services
  • Developing SharePoint 2010/2013 Workflows
  • Working with Client-based APIs for SharePoint 2010/2013
  • Developing Interactive User Interfaces
  • Developing Silverlight Applications for SharePoint
  • Developing Sandboxed Solutions
  • Working with SharePoint Server Profiles and Taxonomy APIs
  • Developing Content Management Solutions

    Prerequisites:

    • An understanding of the problem-solving techniques that apply to software development
    • Approximately 12 months experience with ASP .NET 3.5 with Visual Studio 2008 (or later)
    • Approximately 1 month development experience with SharePoint 2007 or SharePoint 2010/2013 and VS2010/2013 (includes beta releases) creating code that interacts with the SharePoint Sever-side APIs
    • Experience performing end user tasks with SharePoint 2007 or SharePoint 2010/2013 and an understanding of the purpose and use of the following:
      • Lists
      • Documents and Libraries
      • Personalizing an SP Page/Site
      • Using MySites
      • Using SharePoint Designer

    Comments

    Latest comments from students


    User: kelleyd10

    Instructor comments: Clay was / is an outstanding instructor. He was very flexible in what the class needed. He was very accommodating and resourceful in answering the class questions. Clay's teaching style is greatly appreciated.

    Facilities comments: Were good


    User: dennij

    Instructor comments: Very professional and knowledgeable. Available before and after class.

    Facilities comments: Location was nice but too far from Lackland.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    This hands-on course provides a comprehensive introduction to programming logic, and builds a solid foundation of programming skills that can be used to master additional programming languages like C, C++, PERL, Java or Python. To learn programming you must focus on a particular language, and we have chosen Java.  In this course you will write and debug programs in Python. If you would like this course to use a different computer language, that can be arranged.

    Attendees to PL-115: Fundamentals of Computer Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Writing Simple Programs Data Types, Constants, & Variables
    • Screen Output & Keyboard Input
    • Expressions
    • Decision Making
    • Looping
    • Subroutines
    • Debugging
    • Data Collections – Arrays
    • Data Collections – Classes Working with Files

    Prerequisites:

    • This course is for students starting out in programming.  No programming experience is required.

     

    Comments

    Latest comments from students


    User: tsonger

    Instructor comments: While I could tell the instructor was very knowledgeable, his instructions were not very clear. He could've done a better job preparing for the class.

    Facilities comments: Room was fine. The location of the room could have been better as the dings from the elevator were a bit distractive.


    User: TracyPaul

    Instructor comments: Very knowledgeable. Diagnosed our programming problems in short order. Could go into the details of 'why', versus only the 'how'.

    Facilities comments: Outstanding. The hotel staff did a great job supporting our class.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!