Here are our Microsoft Programming courses:
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
Course Overview:
This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles. This leads to the processes of confirming the validity and usability for quality of the product development. An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.
Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objectives: At the conclusion of this course, students will be able to:
- Understand the Scrum Flow, the core components of the Scrum framework
- Understand the scope of the Product Owner role in detail
- Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
- Understand the scope of the Scrum Master role at a high level
- Understand the scope of the Scrum Development Team roles
- Document the interactions between the user of a system and the system itself
- Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format
Target Student:
- Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow provides an array of courses to meet our customer's requirements. Courses that do not fit into our major course categories and custom or specialized courses appear here.
Here are courses about specilaized Software or Hardware:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
- N-495: Voice-over IP (VoIP) Foundations
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
- RH-345: Red Hat JBoss Application Administration I
- TN-102: Writing Effective Requirements
- TN-205: A+ Skills Class
- TN-225: Network+ Skills Class
- TN-245: Telecommunications Fundamentals
- TN-395: Internet Protocol Version 6 (IPv6)
- TN-430: Elasticsearch Engineer (ELK)
- TN-801: Windows for Security Professionals
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- TN-963: Windows Security Automation with PowerShell
- VM-315: VMware Infrastructure: Install, Configure, and Manage
- VM-325: VMware View: Install, Configure and Manage