Course Overview:
This course will be fast paced with in-depth and live demonstrations.
Date/Locations:
No Events
Duration: 1 day
Course Objectives:
- AIDE
- DNS Security with DNSsec
- Logging and Audit Management
- Linux Security Modules and SE-Linux
- Linus Containers (Jailing Services and Apps)
- SSH and SSL tunneling
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
No Events
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
Course Overview:
ITIL Version 4 is divided into 5 areas: Continual Service Improvement; Service Strategy; Service Design; Service Transition; and Service Operation. These 5 areas support the overall focus of ITIL’s service management through the Service Life cycle. IT-113: IT Infrastructure LIbrary (ITIL)- Foundations Course provides a detailed introduction of terms, definitions, benefits, and relationships of the following function and processes as well as roles and responsibilities that supports them.
Attendees to IT-113: IT Infrastructure Library (ITIL) – Foundations Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Service Desk
- Incident Management
- Problem Management
- Configuration Management
- Financial Management for IT
- IT Service Continuity Management
- Service Level Management
- Change Management
- Release Management
- Capacity Management
- Availability Management
Prerequisites:
- Students should have some experience with the specification, development, installation and/or management of information technology.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
CT-205: A+ Certification Course provides students with the skills, knowledge and understanding that will enable them to install, configure, upgrade, troubleshoot and repair personal computer systems. The A+ curriculum is excellent preparation for almost any computer related career or position. This course lays the foundation for further study in networking and programming. Designed for the new computer professional who has support knowledge of PC hardware, but needs to expand upon that knowledge.
Attendees to CT-205: A+ Certification Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Identifying, Adding & Removing System Components
- Installation, Configuring & System Optimization
- Diagnosing & Troubleshooting Problems
- Power Protection & Safety Procedures
- Motherboards, Processors & Memory
- Printers
- Basic Networking
- Operating System Fundamentals
- Installation, Configuration & Upgrade
- Diagnosing & Troubleshooting
- Networks
Prerequisites:
Comments
Latest comments from students
User: whiggins29
Instructor comments: Very knowledgeable, very engaging.
User: jstuke12
Instructor comments: Instructor was wonderful, Tim explained all questions fully and was a pleasure to learn from.
Facilities comments: Facilities were outstanding.
Like the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294