Course Overview:

This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.

Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • The Current State of the Telecom Industry
  • Telecom Service Providers
  • Digitalizing Voice
  • Communication Mediums and Multiplexing
  • Carrier Access: Customer-to-Carrier Connections
  • Broadband Access
  • Enterprise Networks
  • Carrier Transport Services
  • Data Communications and Packet-Switched Networks
  • Migrating Voice from Circuit-to-Packet-Switched Networks
  • Carrier Data Services
  • Ethernet Services
  • Remote Access Virtual Private Networks (VPNs)
  • Video Technology and Services
  • Current Mobile Wireless Services
  • Fixed Mobile Convergence (FMC)
  • Worldwide Interoperability for Microwave Access (WiMax)
  • Multimedia Subsystem (IMS)

Prerequisites:

  • None

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

TechNow’s Course provides existing .NET developers with practical information and labs that enables them to build solutions on the Microsoft SharePoint 2010/2013 platform.

Attendees to MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Introduction to SharePoint 2010/2013 Development Platform
  • Using SharePoint 2010/2013 Developer Tools
  • Developing SharePoint 2010/2013 Web Parts
  • Working with SharePoint Objects on the Server
  • Creating Event Receivers and Application Settings
  • Developing Solutions by Using Business Connectivity Services
  • Developing SharePoint 2010/2013 Workflows
  • Working with Client-based APIs for SharePoint 2010/2013
  • Developing Interactive User Interfaces
  • Developing Silverlight Applications for SharePoint
  • Developing Sandboxed Solutions
  • Working with SharePoint Server Profiles and Taxonomy APIs
  • Developing Content Management Solutions

    Prerequisites:

    • An understanding of the problem-solving techniques that apply to software development
    • Approximately 12 months experience with ASP .NET 3.5 with Visual Studio 2008 (or later)
    • Approximately 1 month development experience with SharePoint 2007 or SharePoint 2010/2013 and VS2010/2013 (includes beta releases) creating code that interacts with the SharePoint Sever-side APIs
    • Experience performing end user tasks with SharePoint 2007 or SharePoint 2010/2013 and an understanding of the purpose and use of the following:
      • Lists
      • Documents and Libraries
      • Personalizing an SP Page/Site
      • Using MySites
      • Using SharePoint Designer

    Comments

    Latest comments from students


    User: kelleyd10

    Instructor comments: Clay was / is an outstanding instructor. He was very flexible in what the class needed. He was very accommodating and resourceful in answering the class questions. Clay's teaching style is greatly appreciated.

    Facilities comments: Were good


    User: dennij

    Instructor comments: Very professional and knowledgeable. Available before and after class.

    Facilities comments: Location was nice but too far from Lackland.


    Liked the class?  Then let everyone know!

    Course Overview:

    PowerShell is made for Security Operations (SecOps) automation on Windows. SecOps requires automation in order to scale out security changes and monitoring beyond a handful of hosts. For example, when a vulnerability must be remediated but there is no patch for it yet, automation is needed to quickly and consistently enact the changes necessary. PowerShell “remoting” is encrypted remote command execution of PowerShell scripts in a way that can scale to thousands of endpoints and servers.

    Imagine being able to hunt for indicators of compromise across thousands of machines with just a few lines of PowerShell code. Or imagine having the local Administrator account password reset every night on thousands of endpoints in a secure way, and being able to retrieve that password securely too.

    We will show you to do these tasks and more. Transcription logging for forensics, strong encryption code signing, application whitelisting of scripts, IPSec port control, and Just Enough Admin (JEA).

    As more and more of our systems are moved up to the cloud, PowerShell will become even more important. Amazon Web Services, Microsoft Azure, Office 365, Hyper-V and VMware already support PowerShell administration for many tasks.

    Attendees to TN-963: Windows Security Automation with PowerShell will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 3 days

    Course Objectives:

    Day One
    PowerShell Overview and Tips

      • Getting started running commands
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.
      • Customizing your profile script

    What Can We Do With PowerShell

      • PowerShell remote command execution
      • Fan-out remoting and security
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Searching remote event logs faster with XPath
      • Mounting the registry as a drive
      • Exporting data to CSV, HTML and JSON files
      • Parsing and mining nmap port scanner XML output
      • Running scripts as scheduled jobs
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

    Write your own scripts

      • Writing your own functions
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, do-while, foreach, switch
      • The .NET Framework class library: a playground
      • How to pipe data in/out of your scripts

    Day Two
    Continuous Secure Configuration Enforcement

      • How to use Group Policy and PowerShell together
      • Automate with INF security templates
      • How to customize INF templates
      • Microsoft Security Compliance Manager (SCM)
      • SECEDIT.EXE scripting
      • Building an in-house security repository for SecOps/DevOps
      • NSA’s Secure Host Baseline GPOs

    Group Policy Precision Targeting

      • Managing Group Policy Objects (GPOs) with PowerShell
      • LSDOU, Block Inheritance, Enforced GPOs
      • Group Policy permissions for targeting changes
      • ADMX templates for mass registry editing
      • Deploying PowerShell startup and logon scripts
      • WMI item-level targeting of GPO preferences
      • GPO scheduled tasks to run PowerShell scripts
      • Remote command execution via GPO (not remoting)
      • Empowering the Hunt Team to fight back!

    Server Hardening for SecOps/DevOps

      • Server Manager scripting with PowerShell
      • Adding and removing roles and feature
      • Remotely inventory roles, features, and apps
      • Why Server Nano or Server Core
      • Running PowerShell automatically after service failure
      • Service account identities, passwords, and risks
      • Tools to reset service account passwords securely

    Day Three
    PowerShell Desired State Configuration (DSC)

      • DSC is Configuration Management built in for free
      • Using DSC for continuous reinforcement of settings
      • Writing your own DSC configuration scripts
      • Free DSC resource modules: www.PowerShellGallery.com
      • How to push DSC configurations to many targets
      • DSC background job processing in push mode
      • Examples: sync files, install roles, manage groups
      • Auditing a remote target against a DSC MOF template
      • “ApplyAndAutoCorrect” mode for continuous enforcement

    PowerShell Just Enough Admin (JEA)

      • JEA is Windows sudo, like on Linux
      • JEA is Windows setuid root, like on Linux
      • Restricting commands and arguments
      • Verbose transcription logging
      • How to set up and configure JEA
      • Privilege Access Workstations (PAWs)

    PowerShell and WMI

      • Windows Management Instrumentation (WMI) service
      • What is WMI and why do hackers abuse it so much?
      • Using PowerShell to query WMI CIM classes
      • WMI authentication and traffic encryption
      • Inventory operating system versions and installed software
      • WMI remote command execution versus PowerShell remoting
      • PowerShell security best practices
      • PowerShell transcription logging to catch hackers

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture.  Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.

    This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang.  Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.

    In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.

    Course Objectives:

    • Learn about Containers, Docker, Kubernetes, and OpenShift architecture
    • Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
    • Tie together awareness of various DoD Cloud offerings and their relationships
    • Create containerized services
    • Manage containers and container images
    • Deploy multi-container applications
    • Install an OpenShift cluster
    • Configure and manage masters and nodes
    • Secure OpenShift
    • Control access to resources on OpenShift
    • Monitor and collect metrics on OpenShift
    • Deploy applications on OpenShift using source-to-image (S2I)
    • Manage storage on OpenShift

    Course Outline:

    • Getting started with container technology
    • Creating containerized services
    • Managing containers
    • Managing container images
    • Creating custom container images
    • Deploying containerized applications on OpenShift
    • Deploying multi-container applications
    • Troubleshooting containerized applications
    • Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
    • Introducing Red Hat OpenShift Container Platform
    • Installing OpenShift Container Platform
    • Describing and exploring OpenShift networking concepts
    • Executing commands
    • Controlling access to OpenShift resources
    • Allocating persistent storage
    • Managing application deployments
    • Installing and configuring the metrics subsystem
    • Managing and monitoring OpenShift Container Platform

    Dates/Locations:

    No Events

    Duration: 5 Days

    Prerequisites:

    • Ability to use a Linux® terminal session and issue operating system commands
    • Good foundation in Linux
    • Experience with web application architectures and their corresponding technologies

    Target Audience:

    • Developers who wish to containerize software applications
    • Administrators who are new to container technology and container orchestration
    • Architects who are considering using container technologies in software architectures
    • System administrators
    • System architects
    • Architects and developers who want to install and configure OpenShift Container Platform
    • Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This course explores the VMware Infrastructure, which consists of VMware ESX Server & VMware Virtual Center Server.  We will look at both the design environments and operational processes of the VMware Infrastructure. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments. Extensive hands-on labs provide for a rich student experience.

    Attendees to VM-315: VMware Infrastructure: Install, Configure, and Manage will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Virtual Infrastructure Overview
    • ESX and ESXi Server Installation
    • Configuration of Networking, Scalability and Security
    • Storage
    • Install and Configure vCenter Server and Components
    • Creation, Deployment, Management, and Migration of Virtual Machines
    • Utilize vCenter Server  for Resource Management
    • Utilize vCenter Server for Virtual Machine Access Control and User Managment
    • Use vCenter Server to increase scalability
    • Monitoring Your Environment
    • Data & Availability Protection Troubleshooting
    • Use VMware vCenter Update Manager to apply ESXi patches

    • Use vCenter Server to manage vMotion, HA, DRS and data protection.

    Prerequisites:

    • To ensure your success, system administration experience on Microsoft or Linux operating systems is required.

    Comments

    Latest comments from students


    User: wolfdenise

    Instructor comments: The instructor was nice and kept us entertained while providing instruction.

    Facilities comments: The facility was nice, clean and easy to get to.


    User: asteeves@aol.com

    Instructor comments: knowledgeable but can get off subject at times

    Facilities comments: good


    Like the class?  Then let everyone know!