TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:

    in   

     

     

     

     

    Course Overview:

    Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.

    If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.

    This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.

    Dates/Locations:

    No Events

    Duration: 10 Days

    Course Content:

      • Module 01. Installing Windows
      • Module 02. Updating Windows
      • Module 03. Post-Installation Configuration and Personalization
      • Module 04. Configuring Peripherals and Drivers
      • Module 05. Configuring Networks
      • Module 06. Configuring Storage
      • Module 07. Managing Apps in Windows 10
      • Module 08. Configuring Authorization & Authentication
      • Module 09. Configuring Data Access and Usage
      • Module 10. Configuring Advanced Management Tools
      • Module 11. Supporting the Windows 10 Environment
      • Module 12. Troubleshooting the Windows OS
      • Module 13. Troubleshooting Files & Applications
      • Module 14. Troubleshooting Hardware and Drivers
      • Module 15. Planning an Operating System Deployment Strategy
      • Module 16. Implementing Windows 10
      • Module 17. Managing Updates for Windows 10
      • Module 18. Device Enrollment
      • Module 19. Configuring Profiles
      • Module 20. Application Management
      • Module 21. Managing Authentication in Azure AD
      • Module 22. Managing Devices and Device Policies
      • Module 23. Managing Security

     

    Prerequisites:

        • Microsoft 365 Certified Fundamentals (M-MS900)

    Target Audience:

    IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Here are our Linux course offerings:

      in   

       

       

       

       

       

       

       

      Course Overview:

      The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

      The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

      What’s Included:

      • 5 days of instructor-led in classroom training
      • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
      • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
      • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
      • CHFI Courseware
      • Exam Voucher
      • CHFI onsite exam scheduling

      Course Objectives:

      • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
      • Perform anti-forensic methods detection
      • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
      • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
      • Identify & check the possible source/ incident origin
      • Recover deleted files and partitions in Windows, MAC OS X, and Linux
      • Conduct reverse engineering for known and suspected malware files
      • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

      Dates/Locations:

      No Events

      Duration: 5 Days

      Course Content:

        • Module 01. Computer Forensics in Today’s World
        • Module 02. Computer Forensics Investigation Process
        • Module 03. Understanding Hard Disks and File Systems
        • Module 04. Data Acquisition and Duplication
        • Module 05. Defeating Anti-forensics Techniques
        • Module 06. Operating System Forensics (Windows, Mac, Linux)
        • Module 07. Network Forensics
        • Module 08. Investigating Web Attacks
        • Module 09. Database Forensics
        • Module 10. Cloud Forensics
        • Module 10. Malware Forensics
        • Module 11. Investigating Email Crimes
        • Module 12. Investigating Email Crimes
        • Module 13. Mobile Forensics
        • Module 14. Forensics Report Writing and Presentation

       

      Prerequisites:

          • 2+ years of proven information security work experience
          • Educational background with digital security specialization

        Target Audience:

          • Law Enforcement
          • Defense & Military
          • E-Business Security
          • Systems Administrators
          • Legal Professionals
          • Banking & Insurance professionals
          • Government Agencies
          • IT Managers

      • Comments

        Latest comments from students


        Liked the class?  Then let everyone know!

       

      Course Overview:

      ITIL Version 4 is divided into 5 areas: Continual Service Improvement; Service Strategy; Service Design; Service Transition; and Service Operation.  These 5 areas support the overall focus of ITIL’s service management through the Service Life cycle.  IT-113: IT Infrastructure LIbrary (ITIL)- Foundations Course provides a detailed introduction of terms, definitions, benefits, and relationships of the following function and processes as well as roles and responsibilities that supports them.

      Attendees to IT-113: IT Infrastructure Library (ITIL) – Foundations Course will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      No Events

      Duration: 3 Days

      Course Objectives:

      • Service Desk
      • Incident Management
      • Problem Management
      • Configuration Management
      • Financial Management for IT
      • IT Service Continuity Management
      • Service Level Management
      • Change Management
      • Release Management
      • Capacity Management
      • Availability Management

      Prerequisites:

      • Students should have some experience with the specification, development, installation and/or management of information technology.

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!