Course Overview:

This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field.  Assessors and Auditors have to face many technologies that are not part of the main stream.  TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures.  Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system.  Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.

Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF.  TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements.  TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security.  Cross Domain overlays are presented that fits the work flow of an assesor.  PII overlays and any overlays that an organization uses and can be made available are also presented.  

This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503.  Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance.  ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program.  TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency.  TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.

More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively.  The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies.  Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).

TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.

A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls.  Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered.  This course is not theory or death by power point.  Real scenarios are presented as exercises.  A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Establish a baseline of RMF knowledge
  • Validate essential security controls, programs, and metrics
  • DoD DCD 6/3 to ICD 503 Transition
  • Lab Environtment and the Cyber Range
  • Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
  • Risk Assessment Report (RAR)
  • Systems Security Plan (SSP)
  • Security Assessment Report (SAR)
  • Plans of Action and Milestone (POAM)

Prerequisites:

Experience in the field of auditing and assesments.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

TechNow’s Course ensures that you are ready to test for the CCNA Certification. This intensive ten-day program is a high end, hands-on, bootcamp using physical routers & switches in classroom.  Students will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. Additionally the course stress tests the students on exam practices that insure the student a successful outcome on the 200-301 CCNA exam.

This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability.

Attendees to N-310: CCNA Extended Bootcamp will receive TechNow approved course materials and expert instruction.

Date/Locations:

This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability. (210) 733-1093

No Events

Duration: 10 days

Course Objectives:

    • Identify the components of a computer network and describe their basic characteristics
    • Understand the model of host-to-host communication
    • Describe the features and functions of the Cisco Internetwork Operating Systems (IOS) software
    • Describe LANs and the role of switches within LANs
    • Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
    • Install a switch and perform the initial configuration
    • Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
    • Describe the TCP/IP Transport layer and Application layer
    • Explore functions of routing
    • Implement basic configuration on a Cisco router
    • Explain host-to-host communications across switches and routers
    • Identify and resolve common switched network issues and common problems associated with IPv4 addressing
    • Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
    • Describe the operation, benefits, and limitations of static routing
    • Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
    • Describe the application and configuration of inter-VLAN routing
    • Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
    • Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
    • Configure link aggregation using EtherChannel
    • Describe the purpose of Layer 3 redundancy protocols
    • Describe basic WAN and VPN concepts
    • Describe the operation of Access Control Lists (ACLs) and their applications in the network
    • Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
    • Describe basic Quality of Service (QoS) concept
    • Describe network and device architectures and introduce virtualization
    • Introduce the concept of network programmability and Software-Defined Networking (SDN)
    • Configure basic IOS system monitoring tools
    • Describe the management of Cisco devices
    • Describe the current security threat landscape
    • Describe threat defense technologies
    • Implement a basic security configuration of the device management plane
    • Implement basic steps to harden network devices

Lab Objectives:

      • Get started with Cisco Command-Line Interface (CLI)
      • Observe How a Switch Operates
      • Perform Basic Switch Configuration
      • Implement the Initial Switch Configuration
      • Inspect TCP/IP Applications
      • Configure an Interface on a Cisco Router
      • Configure and Verify Layer 2 Discovery Protocols
      • Implement an Initial Router Configuration
      • Configure Default Gateway
      • Explore Packet Forwarding
      • Troubleshoot switch Media and Port Issues
      • Troubleshoot Port Duplex Issues
      • Configure Basic IPv6 Connectivity
      • Configure and Verify IPv4 Static Routes
      • Configure Iv6 Static Routes
      • Implement IPv4 Static Routing
      • Implement IPv6 Static Routing
      • Configure VLAN and Trunk
      • Troubleshoot VLANs and Trunk
      • Configure a Router on a Stick
      • Implement Multiple VLANs and Basic Routing Between the VLANs
      • Configure and Verify Single-Area OSPF
      • Configure and Verify EtherChannel
      • Improve Redundant Switched Topologies with EtherChannel
      • Configure and Verify IPv4 ACLs
      • Implement Numbered and Named IPv4 ACLs
      • Configure a Provider-Assigned IPv4 Address
      • Configure Static NAT
      • Configure Dynamic NAT and Port Address Translation (PAT)
      • Implement PAT
      • Log into the WLC
      • Monitor the WLC
      • Configure a Dynamic (VLAN) Interface
      • Configure a DHCP Scope
      • Configure a WLAN
      • Define a Remote Access Dial-In User Service (RADIUS) Server
      • Explore Management Options
      • Explore the Cisco DNA Center
      • Configure and Verify NTP
      • Configure System Message Logging
      • Create the Cisco IOS Image Backup
      • Upgrade Cisco IOS Image
      • Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
      • Secure Console and Remote Access
      • Enable and Limit Remote Access Connectivity
      • Secure Device Administrative Access
      • Configure and Verify Port Security
      • Implement Device Hardening

Prerequisites:

      • Familiarity in the following networking topics:
        • TCP/IP
        • IP Configuration
        • Peer-to-Peer Networking
        • Subnetting
        • Building a Routing Table
      • It is not required but highly recommended to have the following certifications:

Comments

Latest comments from students


User: kdinivahi29

Instructor comments: The instructor Mr. Tom Bigger has done a terrific job of substantiating the textbook content with hands on labs. He has been patient and ensure that we understood the material


User: MikeWisn

Instructor comments: Did exceptional job explaining complicated concepts.

Facilities comments: Hotel front desk phone ringing loudly during class was distracting.


Liked the class?  Then let everyone know!

Course Overview:

Intrusion Analyst is a hands-on course that covers intrusion detection in-depth. This includes concepts such as the use of Snort, network traffic analysis, and IDS signatures.

A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of packet and intrusion analysis.

Attendees to TN-979: Intrusion Analyst will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Advanced Snort Concepts
  • Analyst Toolkit
  • Domain Name System (DNS)
  • Examining Packet Crafting
  • Examining Packet Header Fields
  • Fragmentation
  • ICMP Theory
  • IDS Interoperability
  • IDS Patterns
  • IDS/IPS Management & Architecture Issues
  • Indications, Warnings & Traffic Correlation
  • IPv6
  • Microsoft Protocols
  • Network Traffic Analysis
  • NIDS Evasion, Instertion & Checksums
  • Snort Fundamentals & Configuration
  • Snort GUIs & Sensor Management
  • Snort Performance, Active Response & Tagging
  • Snort Rules
  • Stimulus Response
  • TCPdump Fundamentals
  • TCP/IP Fundamentals
  • Wireshark Fundamentals
  • Writing TCPdump Filters

Course Prerequisites:

  • GSEC or equivalent experience
  • UNIX, Windows, Networking, and Security Experience
  • This is a hands-on skill course requiring comfort with command line interaction and network communications

Comments

Latest comments from students


User: Tosha

Instructor comments: Dave was an excellent instructor. He is very informative and knowledgeable in the course and the material. I have enjoyed the class and I would take another course with him as the instructor.

Facilities comments: Very nice and clean hotel.


User: buckey26

Instructor comments: Dave was one of the best instructors I have ever had for a tech course. He broke down everything to the point where you can understand it internally.


Liked the class?  Then let everyone know!

  

 

Course Overview:  PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats.  Successful completion of this course enables administrators to better understand the threat landscape.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats  (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.

Dates/Locations: No Events

Duration: 2 days

Course Objectives:   Students attending this training course will gain an understanding of cyberthreats and their characteristics.  Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.

Day 1

  • Mod 1: Threat Landscape
    • Advanced Persistent
    • Threats
    • Data Breaches and Tactics
    • Threat Management
    • Strategies
  • Mod 2: Integrated
    • Approach to Threat
    • Protection
    • Integrated Approach to
    • Protection
    • Next-Generation Firewall
    • Advanced Endpoint
    • Protection
  • Mod 3: Network Visibility
    • Zero Trust Model
    • SSL Decryption
    • Decryption Policy
  • Mod 4: Reducing the Attack
    • Surf
    • ection

 

Day 2

  • Mod 5: Handling Known
    • Threats
    • WildFire Analysis
    • Security Profiles
  • Mod 6: Handling Unknown
    • Traffic and Zero-Day Exploits
    • WildFire
    • Researching Threat Events
    • Identifying Unknown
    • Applications
  • Mod 7: Investigating
    • Breaches
    • Identify IOCs Using
    • App-Scope
    • Log Correlation
    • Finding Infected Host
  • Mod 8: Using Custom
    • Signatures
    • Creating Custom App-IDs
    • Threat Signatures

A

Prerequisites:

  • Students must complete the PA-213: Install, Configure, and Manage course
  • Understanding of network concepts, including routing, switching, and IP addressing
  • In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering

This course is in no way associated with Palo Alto Networks, Inc.

Comments

Latest comments from students


Like the class?  Then let everyone know!

Course Overview:

A skills focus enables the student to better absorb the subject matter and perform successfully on the job.  This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations.  PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC).  The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.

Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Active Directory and BloodHound
  • Security Controls
  • PKI
  • Encryption
  • Wireless & Network Security and Hardening DNS
  • 802.1x and Endpoint Protection
  • Firewalls and VPN
  • PowerShell Scripting
  • JEA, DSC, Enterprise Security with PowerShell
  • Windows Attack Strategies

Prerequisites:

  • Security+
  • Windows System Administration Skills

 

Comments

Latest comments from students


User: bbrabender

Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.

Facilities comments: N/A


User: dale.r.anderson

Instructor comments: Instructor was well knowlegeable accross alot of domains.

Facilities comments: Pretty good


Liked the class?  Then let everyone know!