- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:
- TN-345: Python for Penetration Testers
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-909: Windows Forensic Analysis
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
No EventsDuration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!

Course Overview:
This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field. Assessors and Auditors have to face many technologies that are not part of the main stream. TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures. Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system. Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.
Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF. TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements. TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security. Cross Domain overlays are presented that fits the work flow of an assesor. PII overlays and any overlays that an organization uses and can be made available are also presented.
This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503. Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance. ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program. TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency. TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.
More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively. The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies. Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).
TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.
A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls. Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered. This course is not theory or death by power point. Real scenarios are presented as exercises. A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.
Date/Locations:
Duration: 5 days
Course Objectives:
- Establish a baseline of RMF knowledge
- Validate essential security controls, programs, and metrics
- DoD DCD 6/3 to ICD 503 Transition
- Lab Environtment and the Cyber Range
- Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
- Risk Assessment Report (RAR)
- Systems Security Plan (SSP)
- Security Assessment Report (SAR)
- Plans of Action and Milestone (POAM)
Prerequisites:
Experience in the field of auditing and assesments.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
In this course, you will gain the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security Appliance.
Attendees to N-455: Securing Networks with ASA Fundamentals (SNAF) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introducing Cisco Security Appliance Technology and Features
- Cisco Adaptive Security Appliance and PIX Security Appliance Families
- Getting Started with Cisco Security Appliances
- Essential Security Appliance Configuration
- Configuring Translations and Connection Limits
- Using ACLS and Content Filtering
- Configuring Object Grouping
- Switching and Routing on Security Appliances
- Configuring AAA for Cut-Through Proxy
- Configuring the Cisco Modular Policy Framework
- Configuring Advanced Protocol Handling
- Configuring Threat Detection
- Configuring Site-to-Site VPNS Using PreShared Keys
- Configuring Security Appliance Remote Access VPNs
- Configuring Cisco Security Appliance for SSL VPN
- Configuring Transparent Firewalls Mode
- Configuring Security Contexts
- Configuring Failover
- Managing Security Appliances
Prerequisites:
Comments
Latest comments from students