Course Overview: 

Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Pen Testing using the PTES model
  • Metasploit Basics
    • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
  • Intelligence Gathering
    • Nmap, Databases in Metasploit, Port Scanning with Metasploit
  • Quick Intro to Ruby
    • Writing a simple Ruby script to create a custom scanner
  • Vulnerability Scanning
    • Importing Nessus Results
    • Scanning with Nessus from Within Metasploit
  • Exploitation
    • Using the Metasploit Framework and console to exploit
  • Meterpreter
    • Compromising a Windows System
    • Attacking MS SQL, xp_cmdshell
    • Dumping Usernames and Passwords, extracting and dumping hashes
    • Pass the Hash and Token Impersonation
    • Pivoting
    • Railgun
    • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
  • Avoiding Detection
    • Creating Stand-Alone Binaries with MSFpayload
    • Encoding with MSFencode and Packers (go Green Bay:)
  • Exploitation Using Client Side Attacks
    • Introduction to Immunity Debugger
    • Using Immunity Debugger to Decipher NOP Shellcode
  • Metasploit Auxiliary Modules
  • Social Engineer Toolkit (SET)
    • Spear-Phishing, Web Attack
    • Creating a Multipronged Attack
  • Creating Your Own Module
    • Adapt an existing Module
    • Add some PowerShell and Run the Exploit
  • Meterpreter Scripting
  • Capture The Flag Exercise

Prerequisites:

  • This is an advanced  Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • An understanding of TCP/IP

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

Increase your credibility, job security, and career opportunities by reaching your goal and getting certified!  TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class.  We have a proven testing program that will get you the results you want!

in   

 

 

 

 

Course Overview:

Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.

If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.

This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.

Dates/Locations:

No Events

Duration: 10 Days

Course Content:

    • Module 01. Installing Windows
    • Module 02. Updating Windows
    • Module 03. Post-Installation Configuration and Personalization
    • Module 04. Configuring Peripherals and Drivers
    • Module 05. Configuring Networks
    • Module 06. Configuring Storage
    • Module 07. Managing Apps in Windows 10
    • Module 08. Configuring Authorization & Authentication
    • Module 09. Configuring Data Access and Usage
    • Module 10. Configuring Advanced Management Tools
    • Module 11. Supporting the Windows 10 Environment
    • Module 12. Troubleshooting the Windows OS
    • Module 13. Troubleshooting Files & Applications
    • Module 14. Troubleshooting Hardware and Drivers
    • Module 15. Planning an Operating System Deployment Strategy
    • Module 16. Implementing Windows 10
    • Module 17. Managing Updates for Windows 10
    • Module 18. Device Enrollment
    • Module 19. Configuring Profiles
    • Module 20. Application Management
    • Module 21. Managing Authentication in Azure AD
    • Module 22. Managing Devices and Device Policies
    • Module 23. Managing Security

 

Prerequisites:

      • Microsoft 365 Certified Fundamentals (M-MS900)

Target Audience:

IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

TechNow has been involved in enterprise security architectures and education since 1990.  TechNow’s training program has followed the evolution of enterprise computing into security architectures.  Palo Alto Networks represents the current state of security product evolution.  With next generation firewall technology, the reunification of your security architecture is possible.  TechNow can present the ramifications of many centralized strategies.  All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
Palo Alto Networks Certifications:  Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take  EDU-201 + EDU-205 + EDU-221
TechNow is a mobile Pearson VUE Authorized Testing Center.  Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course.  Take the course and get certfied, without  logistical effort of getting students to a training facility and the hassle of scheduling testing.
TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
in   
 

Course Overview: 

In this course-currently the only offering in the market devoted to Group Policy training-you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.

Attendees to TN-5455: Managing Windows Environments with Group Policy will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Features and functions of Group Policy
  • Use Group Policy management tools to manage security policies
  • Design a Group Policy infrastructure
  • Group Policy processing architecture
  • Back up, restore, import, and copy Group Policy Objects through the Group Policy
  • Management Console
  • Use Windows PowerShell to manage Group Policy
  • Implement security using Group Policy
  • Configure the desktop environment with Group Policy
  • Configure roaming profiles and Folder Redirection
  • Assign and publish software packages
  • Implement AppLocker and software restriction policies
  • Create and deploy Administrative Templates
  • Configure Group Policy preferences

 

 

Course Prerequisites:

  • Experience with the Microsoft Windows Server 2008/12 environments and a fundamental understanding of Active Directory

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!