Here are the General Unix course offerings:
Course Overview:
TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI. This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .
TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams. Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI. As with many advanced TechNow security courses, there is a large hands-on ratio. This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries. CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.
This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. . MDT puts us close the mission and helps define the internal context to be analyzed against the CTI. TechNow pushes the student to truly understand how to think about and use CTI to make a difference.
Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Learn to comprehend and develop complex scenarios
- Identify and create intelligence requirements through practices such as threat modeling
- Utilize threat modeling to drive intelligence handling and practices
- Breakdown tactical, operational, and strategic-level threat intelligence
- Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
- How to collect adversary information creating better value CTI
- How to filter and qualify external sources, mitigating low integrity intelligence
- Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
- Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
- Breaking down threats mapped against their tradecraft to tweak IOCs
- Establish structured analytical techniques to be successful in any security role
- Learn and apply structured principles in support of CTI and how to communicate that to any security role.
Course Prerequisites:
- Security+, or equivalent experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The System Administration I for Red Hat course is designed for IT professionals working to become full-time enterprise Linux system administrators. This course gives the student direct experience with the most essential system administration tasks in the Red Hat. You will be instructed in crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local disk devices, installation, package management, performing system boot procedures, grub and controlling system processes.
Attendees to RH-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Installation
- Manage File Systems and Local Disk Drives
- Perform Mounts and Unmounts
- Perform System Boot Procedures
- Tuning and Maintaining the Kernel
- Control System Processes
- Perform User Administration
- Installing and Managing Services
- Perform Package Administration
- Client Setup of SSH and Printing
Prerequisites:
Comments
Latest comments from students
User: mlspence
Instructor comments: Bill was awesome! He did a fantastic job teaching the course mater to everyone in the class. He made sure everyone was able to keep up and that they understood the material before moving on. Thanks!
Facilities comments: They were great as well
Liked the class? Then let everyone know!
Course Overview: PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.
Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 days
Course Objectives: Students attending this training course will gain an understanding of cyberthreats and their characteristics. Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.
Day 1
|
Day 2
A |
Prerequisites:
- Students must complete the PA-213: Install, Configure, and Manage course
- Understanding of network concepts, including routing, switching, and IP addressing
- In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class? Then let everyone know!
Here are the Cisco Security course offerings:
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- TN-865: Wireshark Network Traffic and Security Analysis