Increase your credibility, job security, and career opportunities by reaching your goal and getting certified! TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class. We have a proven testing program that will get you the results you want!
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
Learn about Containers, Docker, Kubernetes, and OpenShift architecture
This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.
Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
The Current State of the Telecom Industry
Telecom Service Providers
Digitalizing Voice
Communication Mediums and Multiplexing
Carrier Access: Customer-to-Carrier Connections
Broadband Access
Enterprise Networks
Carrier Transport Services
Data Communications and Packet-Switched Networks
Migrating Voice from Circuit-to-Packet-Switched Networks
Carrier Data Services
Ethernet Services
Remote Access Virtual Private Networks (VPNs)
Video Technology and Services
Current Mobile Wireless Services
Fixed Mobile Convergence (FMC)
Worldwide Interoperability for Microwave Access (WiMax)
Intrusion Analyst is a hands-on course that covers intrusion detection in-depth. This includes concepts such as the use of Snort, network traffic analysis, and IDS signatures.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of packet and intrusion analysis.
Attendees to TN-979: Intrusion Analyst will receive TechNow approved course materials and expert instruction.
UNIX, Windows, Networking, and Security Experience
This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: Tosha
Instructor comments: Dave was an excellent instructor. He is very informative and knowledgeable in the course and the material. I have enjoyed the class and I would take another course with him as the instructor.
Facilities comments: Very nice and clean hotel.
User: buckey26
Instructor comments: Dave was one of the best instructors I have ever had for a tech course. He broke down everything to the point where you can understand it internally.
Certified AI Program Manager (CAIPM) is EC-Council’s professional certification for people responsible for owning AI decisions and driving execution: business, technology, data, and risk.
The Certified AI Program Manager (CAIPM) Course equips you with hands-on expertise across the full spectrum of AI tools, from conversational AI and image generation to code assistants and audio synthesis.
Participants will learn how to evaluate, deploy, and integrate AI tools into enterprise workflows, understanding not just how they work, but how to leverage them for maximum business impact. This course covers how to assess AI readiness across teams and processes, Prioritize AI use cases tied to business outcomes, Design adoption and rollout roadmaps , Coordinate delivery across cross-functional teams, implement governance, Responsible AI, and security controls , and how to track performance and ROI to prove value
By the end of the course, learners will be well-prepared to take the Certified AI Program Manager (CAIPM) exam and demonstrate the ability to own AI initiatives end to end , validate mastery of decision framing and trade-off analysis for AI initiatives and Apply governance, ethics, and risk management principles across the AI lifecycle.
Course Objectives:
•MLOps Principles: Model life cycle management for scalable, production-ready AI •Use Case Evaluation: ROI-driven assessment and prioritization of AI initiatives •AI Strategy Frameworks: Enterprise AI roadmapping, portfolio planning, and value prioritization •AI Investment Justification: Quantifying AI value, ROI, and mission impact for funding decisions •Change Management: Workforce enablement and stakeholder alignment •KPI Development: AI metrics, success indicators, and executive dashboards •AI Governance: Risk, ethics, compliance, and responsible AI principles •Vendor Evaluation: AI platform and tool selection aligned with enterprise needs
Dates/Locations:
No Events
Prerequisites:Familiarity with generative AI concepts, prompt engineering fundamentals, and AI workflows will help you succeed.