TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
Course Overview: PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205) Training Class is a two-day course that teaches students to configure and manage the entire line of Palo Alto Networks next-generation firewalls. Students also will be instructed on the basics of implementing and managing GlobalProtect™ and active/ active high availability. Students will gain an in-depth knowledge of how to optimize their visibility and control of applications, users, and content. This course prepares the student for Palo Alto Networks Certified Network Security Engineer (PCNSE). Through hands-on training, students learn high end skills of how to integrate Palo Alto next-generation firewalls into their network infrastructure. This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
This course sets up the foundation for the three day course PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311). The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications. Attendees to the PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205) Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations: No Events
Duration: 2 days
Course Objectives: Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall. Students also will be instructed on the basics of implementing and managing GlobalProtect™ and active/ active high availability. Students will gain an in-depth knowledge of how to optimize their visibility and control of applications, users, and content.
Day 1
- Module 0 – Introduction & Overview
- Mod 1: Advanced Interface
- Configuration
- Advanced NAT
- Policy-Based
- Forwarding
- Routing Protocols (OSPF)
- Mod 2: App-ID™ –
- Custom Applications
- Defining New Application Signatures
- Application Override
- Mod 3: Advanced Content-ID™
- Custom Threat Signatures
- Data Filtering
- DoS Protection
- Botnet Report
- Mod 4: Advanced User-ID™
- Terminal Server Agent
- Captive Portal
- XML API
|
Day 2
- Mod 5: Quality of Service
- Configuring Quality of Service
- Mod 6: GlobalProtect™
- Implementation of GlobalProtect
- Install and Configure Portal, Gateway, and Agents
- Mod 7: Monitoring and Reporting
- Log Forwarding
- SNMP
- Reporting
- Mod 8: Active/Active High Availability
- Configuring Active/Active HA
|
Prerequisites:
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Accessing the Network
- Advanced Fuzzing Techniques
- Advanced Stack Smashing
- Attacking the Windows Domain – Enumeration
- Attacking the Windows Domain – Restricted Desktops
- Attacking the Windows Domain – The Attacks
- Building a Metasploit Module
- Crypto for Penetration Testers
- Exploiting the Network
- Fuzzing Introduction and Operation
- Introduction to Memory and Dynamic Linux Memory
- Introduction to Windows Exploitation
- Manipulating the Network
- Python and Scapy For Penetration Testers
- Shellcode
- Smashing the Stack
- Windows Heap Overflow Introduction
- Windows Overflows
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: ryanv
Instructor comments: Great.
Facilities comments: N/A. Hotel.
User: sean.hollinger
Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow.
Facilities comments: adequate
Liked the class? Then let everyone know!
Course Overview:
TechNow’s CCSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Cloud Security Professional exam. The exam covers (ISC)²’s 6 Domains from the Common Body of Knowledge, which encompass the whole of cloud security.
This course is an intense 5 day program. TechNow has a proven training and certification track record that you can depend on. CCSP test is 125 questions that typically require more comprehension than CISSP questions. The instructor takes time to walk through scenarios that assume comprehensive knowledge of enterprise infrastructures.
Attendees to CL-315: CCSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.
The 6 domains of the CCSP CBK:
- Architectural Concepts & Design Requirements
- Cloud Data Security
- Cloud Platform & Infrastructure Security
- Cloud Application Security
- Operations
- Legal & Compliance
Duration: 5 days
Audience: Mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing. CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.
DoD 8140: Not Mandated
Course Prerequisites: IT professional with 5 years of experience, 3 years of security experience, and at least 1 year of cloud security experience. GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures. CCSP test is 125 questions that typically require more comprehension than CISSP questions. This course is for those who are already qualified at the enterprise level for IT infrastructures, have Cloud experience, and are looking for a Cloud Security certification.
Course Objectives:
Domain 1: Architectural Concepts and Design Requirements
- Module 1: Understand cloud computing concepts
- Module 2: Describe cloud reference architecture
- Module 3: Understand security concepts relevant to cloud computing
- Module 4: Understand design principles of secure cloud computing
- Module 5: Identify trusted cloud services
Domain 2: Cloud Data Security
- Module 1: Understand Cloud Data Life Cycle
- Module 2: Design and Implement Cloud Data Storage Architectures
- Module 3: Understand and implement Data Discovery and Classification Technologies
- Module 4: Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
- Module 5: Design and implement Data Rights Management
- Module 6: Plan and Implement Data Retention, Deletion, and Archival policies
- Module 7: Design and Implement Auditability, Traceability, and Accountability of Data Events
Domain 3: Cloud Platform Infrastructure Security
- Module 1: Comprehend Cloud Infrastructure Comp
- Module 2: Analyze Risks Associated to Cloud Infrastructure
- Module 3: Design and Plan Security Controls
- Module 4: Plans Disaster Recovery & Business Continuity Management
Domain 4: Cloud Application Security
- Module 1: Recognize Need for Training and Awareness in Application Security
- Module 2: Understand Cloud Software Assurance and Validation
- Module 3: Use Verified Secure Software
- Module 4: Comprehend the Software Development Life Cycle (SDLC) Process
- Module 5: Apply the Secure Software Development Life Cycle
- Module 6: Comprehend the Specifics of Cloud Application Architecture
- Module 7: Design Appropriate Identity and Access Management (IAM) Solutions
Domain 5: Operations
- Module 1: Support the Planning Process for the Data Center Design
- Module 2: Implement and Build Physical Infrastructure for Cloud Environment
- Module 3: Run Physical Infrastructure for Cloud Environment
- Module 4: Manage Physical Infrastructure for Cloud Environment
- Module 5: Build Logical Infrastructure for Cloud Environment
- Module 6: Run Logical Infrastructure for Cloud Environment
- Module 7: Manage Logical Infrastructure for Cloud Environment
- Module 8: Ensure Compliance with Regulations and Controls
- Module 9: Conduct Risk Assessment to Logical and Physical Infrastructure
- Module 10: Understand the Collection and Preservation of Digital Evidence
- Module 11: Manage Communications with Relevant Parties
Domain 6: Legal and Compliance
- Module 1: Understand Legal Requirements and Unique Risks Within the Cloud Environment
- Module 2: Understand Privacy Issues, Including Jurisdictional Variances
- Module 3: Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
- Module 4: Understand Implication of Cloud to Enterprise Risk Management
- Module 5: Understand Outsourcing and Cloud Contract Design
- Module 6: Execute Vendor Management
Dates/Locations: No Events
Course Overview:
TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam. The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.
This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try. We encourage our students to take the exam within a week after course completion. The goal for this course is a pass rate of one and done. Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days. TechNow has a proven CISSP track record that you can depend on.
Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 10 Days
Course Objectives:
Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communications and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Prerequisites:
To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:
- 4 years of experience in the information security field
- or 3 years experience & a college degree
Contact TechNow to verify that you qualify.
Comments
Latest comments from students
Facilities comments:
User: pulliamp
Instructor comments:
Liked the class? Then let everyone know!