Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Manage Identity
  • Plan Desktop and Device Deployment
  • Plan and Implement a Microsoft 365 Solution
  • Configure Networking
  • Configure Storage
  • Manage Data Access and Protection
  • Manage Remote Access
  • Manage Apps
  • Manage Updates and Recovery

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

We are often asked what is the recommended sequence of classes.  Here is our recommended sequence of classes for The Security Field.

Certified Information Security Manager (CISM)

CT-325 CompTIA Security+ Arrowright TN-825 Certified Information Security Manager

Certified Information Systems Auditor(CISA)

CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-822: Certified Information Systems Auditor (CISA)

Certified Information Systems Security Professional(CISSP)

CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-815 CISSP Certification Prep Seminar

 

Course Overview:

This course explores the VMware Infrastructure, which consists of VMware ESX Server & VMware Virtual Center Server.  We will look at both the design environments and operational processes of the VMware Infrastructure. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments. Extensive hands-on labs provide for a rich student experience.

Attendees to VM-315: VMware Infrastructure: Install, Configure, and Manage will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Virtual Infrastructure Overview
  • ESX and ESXi Server Installation
  • Configuration of Networking, Scalability and Security
  • Storage
  • Install and Configure vCenter Server and Components
  • Creation, Deployment, Management, and Migration of Virtual Machines
  • Utilize vCenter Server  for Resource Management
  • Utilize vCenter Server for Virtual Machine Access Control and User Managment
  • Use vCenter Server to increase scalability
  • Monitoring Your Environment
  • Data & Availability Protection Troubleshooting
  • Use VMware vCenter Update Manager to apply ESXi patches

  • Use vCenter Server to manage vMotion, HA, DRS and data protection.

Prerequisites:

  • To ensure your success, system administration experience on Microsoft or Linux operating systems is required.

Comments

Latest comments from students


User: wolfdenise

Instructor comments: The instructor was nice and kept us entertained while providing instruction.

Facilities comments: The facility was nice, clean and easy to get to.


User: asteeves@aol.com

Instructor comments: knowledgeable but can get off subject at times

Facilities comments: good


Like the class?  Then let everyone know!

 

Course Overview:

Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture.  Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.

This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang.  Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.

In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.

Course Objectives:

  • Learn about Containers, Docker, Kubernetes, and OpenShift architecture
  • Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
  • Tie together awareness of various DoD Cloud offerings and their relationships
  • Create containerized services
  • Manage containers and container images
  • Deploy multi-container applications
  • Install an OpenShift cluster
  • Configure and manage masters and nodes
  • Secure OpenShift
  • Control access to resources on OpenShift
  • Monitor and collect metrics on OpenShift
  • Deploy applications on OpenShift using source-to-image (S2I)
  • Manage storage on OpenShift

Course Outline:

  • Getting started with container technology
  • Creating containerized services
  • Managing containers
  • Managing container images
  • Creating custom container images
  • Deploying containerized applications on OpenShift
  • Deploying multi-container applications
  • Troubleshooting containerized applications
  • Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
  • Introducing Red Hat OpenShift Container Platform
  • Installing OpenShift Container Platform
  • Describing and exploring OpenShift networking concepts
  • Executing commands
  • Controlling access to OpenShift resources
  • Allocating persistent storage
  • Managing application deployments
  • Installing and configuring the metrics subsystem
  • Managing and monitoring OpenShift Container Platform

Dates/Locations:

No Events

Duration: 5 Days

Prerequisites:

  • Ability to use a Linux® terminal session and issue operating system commands
  • Good foundation in Linux
  • Experience with web application architectures and their corresponding technologies

Target Audience:

  • Developers who wish to containerize software applications
  • Administrators who are new to container technology and container orchestration
  • Architects who are considering using container technologies in software architectures
  • System administrators
  • System architects
  • Architects and developers who want to install and configure OpenShift Container Platform
  • Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Course Overview:

In this course students will learn to configure the Linux kernel, install & configure modules, to install and configure non-default devices and automate installation with Kickstart. Students also utilize skills developed in L-245 to expand on file system configuration with spanning devices and RAID. This is the foremost server side Linux course in the industry covering all server side components such as DHCP, Samba, NIS, LDAP, inet, telnet ftp, dns, etc.  Expanding on security introduced in L-245: Linux System Administration I, TCP wrappers, firewalling with IP filters, SQUID, & ssh are covered.

Attendees to L-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Custom installation of a Linux server
  • Linux device naming conventions & the boot process
  • Adding peripheral devices
  • Reconfiguring the kernel
  • Disk partitioning & formatting
  • Changing system run levels
  • Adding startup files for additional services
  • Adding & removing software packages
  • Disk & file system Administration
  • Terminals & modem configuration
  • Configuring NFS to support the client/server environment
  • Use the automounter
  • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
  • Troubleshooting techniques
  • Advanced Linux installation

Prerequisites:

Comments

Latest comments from students



Liked the class?  Then let everyone know!