Here are our Microsoft Programming courses:
Course Overview:
This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform. The course focuses on C# program structure, language syntax & implementation details. C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++. It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.
Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of the Microsoft .NET Platform Overview of C#
- Using Value-Type Variables
- Statements & Exceptions
- Methods & Parameters
- Arrays
- Essentials of Object-Oriented Programming
- Using Reference-Type Variables
- Creating & Destroying Objects
- Inheritance in C#
- Aggregation, Namespaces & Advanced Scope
- Operators & Events Properties & Indexes
- Attributes
Prerequisites:
- Experience with programming in C, C++, Visual Basic, Java or another programming language
Comments
Latest comments from students
User: jdmccol
Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.
Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.
Liked the class? Then let everyone know!
Course Overview:
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.
Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/09/2026 - 03/13/2026 08:00 -16:00 |
N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) TechNow, Inc, San Antonio TX |
|
06/29/2026 - 07/03/2026 08:00 -16:00 |
N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) TechNow, Inc, San Antonio TX |
|
10/05/2026 - 10/09/2026 08:00 -16:00 |
N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
Prerequisites:
- CCNA certification
- Implementation of Enterprise LAN networks
- Basic understanding of Enterprise routing and wireless connectivity
- Basic understanding of Python scripting
Comments
Latest comments from students
User: don.seguin
Instructor comments: Tim was a great.
Facilities comments: The classroom was great.
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Great
Liked the class? Then let everyone know!
Course Overview:
This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles. This leads to the processes of confirming the validity and usability for quality of the product development. An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.
Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objectives: At the conclusion of this course, students will be able to:
- Understand the Scrum Flow, the core components of the Scrum framework
- Understand the scope of the Product Owner role in detail
- Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
- Understand the scope of the Scrum Master role at a high level
- Understand the scope of the Scrum Development Team roles
- Document the interactions between the user of a system and the system itself
- Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format
Target Student:
- Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!