Course Overview:
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.
Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Implement network settings to provide a secure wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of networks and wireless networks
- Routing and switching knowledge
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!
Over twenty years experience in the area of Solaris, Linux, and Unix ensures that you are benefiting from a very mature and successful Solaris, Linux, and Unix training program. TechNow offers the full suite of Solaris, Linux, and Unix courses utilizing real hardware. This is not virtualized Solaris on Intel processors, or remote connection to a distant system. The student learns to deal with real hardware taking advantage of Sparc T series processors. Solaris 10 and Solaris 11 is taught hands-on with data center skills as the focus. We also offer Solaris 10 migration courses to Solaris 10 or Solaris 11.
The following is a list of our Unix/Linux training courses:
- CT-245: Linux+
- L-245: Linux System Administration I
- L-295: Linux System Administration II
- L-395: Accelerated Linux Administration and Utilities
- RH-245: Linux System Administration I
- RH-295: Linux System Administration II
- RH-345: Red Hat JBoss Application Administration I
- RH-355: RHCSA Rapid Track Course
- TN-125: Introduction to UNIX and Linux
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-430: Elasticsearch Engineer (ELK)
- TN-901: Linux for Security Professionals
- TN-959: UNIX Security Administrator Course
Course Overview:
This course will be fast paced with in-depth and live demonstrations.
Date/Locations:
Duration: 1 day
Course Objectives:
- AIDE
- DNS Security with DNSsec
- Logging and Audit Management
- Linux Security Modules and SE-Linux
- Linus Containers (Jailing Services and Apps)
- SSH and SSL tunneling
Prerequisites:
Comments
Latest comments from students