Course Overview:

This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years.  This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux.  RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course.  The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux.  The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.

Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

Day 1 and 2: Unix Review and Unix  Utilities

  • Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
  • Linux File, Directory, and Permissions Management
  • Linux  archives using tar and zip
  • Interacting with BASH
  • Review of Common Linux commands
  • Sorting files by line or field
  • Regular Expressions (meta character) with grep commands to locate specific lines in files
  • Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
  • Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
  • Miscellaneous commands Tr, sort, cut, past, pr -Lab
  • Performing non-interactive editing tasks with the sed command
  • Writing simple sed scripts to perform complex editing tasks
  • Using awk variables & arrays to sort data
  • Employing awk programs to manipulate numeric & textual data
  • Performing formatted printing in awk
  • Writing simple awk programs to write reports from data files
  • Using built-in awk functions & defining new functions
  • Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
 
Day 3 – Intro to Programming / Shell Scripting
  • Shell Review
  • Shell Interpretation of Quotes & Backslash
  • The Bash Shell
  • Shell's combined with UNIX utilities
  • Programming Basics
  • Data Constructs
  • Programming Looping
  • Your Environment
  • More on Parameters

Day 4 and 5 – Security Fundamentals, Linux Administration

  • System Configuration / Kernel overview 
  • System Maintenance / Disk and file admin
  • Using utilities for process control, locating files & automating maintenance tasks
  • System Startup / Boot Process – LILO & GRUB Configuration
  • Managing the Linux file system
  • Customization of setup files
  • Run Levels
  • Network Services / Configuration
  • User Management Monitoring, accessing & restricting root system access
  • Administration Tools
  • Process Control
  • Client side components of NFS, Samba, NTP, NIS
  • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.

Prerequisites:

  • Prior UNIX/Linux experience or training

Comments

Latest comments from students


User: mikenaya

Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.

Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.


User: fquinene

Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.

Facilities comments: Facility was fine


Liked the class?  Then let everyone know!

TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.

 

Course Overview:

This five-day instructor-led course provides IT professionals with the knowledge and skills required to Support and Troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.

Attendees to TN-5320: Supporting and Troubleshooting Windows 11 will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Describe the processes involved in planning and using a troubleshooting methodology for Windows 11
  • Troubleshoot startup issues and operating system services on a Windows 11 PC
  • Perform system recovery
  • Resolve issues related to hardware devices and device drivers
  • Administer Windows 11 devices
  • Troubleshoot issues related to network connectivity
  • Configure Windows 11 devices by using Group Policy
  • Configure and troubleshoot user settings
  • Configure and troubleshoot resource access
  • Implement remote connectivity
  • Deploy and troubleshoot applications
  • Maintain Windows 11 devices

 

 Prerequisites: 

  • Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS).
  • Microsoft Active Directory Domain Services (AD DS) principles.
  • Understanding of the Public Key Infrastructure (PKI) components.
  • Windows Server fundamentals.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Manage Identity
  • Plan Desktop and Device Deployment
  • Plan and Implement a Microsoft 365 Solution
  • Configure Networking
  • Configure Storage
  • Manage Data Access and Protection
  • Manage Remote Access
  • Manage Apps
  • Manage Updates and Recovery

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview: 

 

This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles.  This leads to the processes of confirming the validity and usability for quality of the product development.  An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.

Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Understand the Scrum Flow, the core components of the Scrum framework
  • Understand the scope of the Product Owner role in detail
  • Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
  • Understand the scope of the Scrum Master role at a high level
  • Understand the scope of the Scrum Development Team roles
  • Document the interactions between the user of a system and the system itself
  • Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.

Comments

Latest comments from students


Liked the class?  Then let everyone know!