Here are the General Unix course offerings:
Course Overview:
This course provides students with the knowledge and skills to implement a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to implementing a database.
Attendees to MS-6232: Implementing a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Creating Databases and Databases Files
- Creating Data Types and Tables
- Creating and Tuning Indexes
- Implementing Data Integrity by Using Constraints and Triggers
- Using XML
- Implementing Views
- Implementing Stored Procedures
- Implementing Functions
- Implementing Managed Code in the Database
- Managing Transactions and Locks
- Using Service Broker
Prerequisites:
- Basic knowledge of the Microsoft Windows operating system and its core functionality
- Working knowledge of Transact-SQL
- Working knowledge of relational databases
- Some experience with database design
Comments
Latest comments from students
User: bangbangsplat
Instructor comments: some kind of presentation would have been helpful in learning the objectives of the course (PowerPoint, drawing on easel, etc.) It seemed like the instructor is not too familiar with the error codes we were receiving during the Practice Exams.
Facilities comments: preferred to have the location located in a less busy area of the city
User: smaxam
Instructor comments: Clay was very knowledgable but had to repeat questions a number of times to get his attention.
Facilities comments: Holiday Inn was nice
Liked the class? Then let everyone know!
Course Overview:
This class uses a sample product development initiative to illustrate the course principles. If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course will cover the Agile adaptive life cycle framework and all of the ceremonies, artifacts, and roles.
Attendees to PM-222: Agile Principles using will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objectives: At the conclusion of this course, students will be able to:
- Compare the Agile (adaptive) and Plan Driven (predictive/ waterfall) approaches
- Understand the Agile Manifesto and SCRUM Framework
- Apply the basics of Agile / SCRUM Team Organization, with importance of the Development Team responsibilities
- Use Agile / SCRUM chartering, high-level estimating, and prioritization techniques to initiate a Product Roadmap and a Product Backlog
- Create personas and user stories to lead to Development Team task assignments
- Understand Release and Sprint Planning to lead to the Sprint Backlog
- Plan and conduct a sample SCRUM Sprint from the Vision Statement through the Sprint retrospective
Target Student:
- Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.
Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.
Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.
Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
• Virtual Infrastructure Overview
• ESX and ESXi Server Installation
• Configuration of Networking, Scalability and Security
• Storage
• Install and Configure vCenter Server and Components
• Creation, Deployment, Management, and Migration of Virtual Machines
• Utilize vCenter Server for Resource Management
• Utilize vCenter Server for Virtual Machine Access Control and User Managment
• Use vCenter Server to increase scalability
• Monitoring Your Environment
• Data & Availability Protection Troubleshooting
• Use VMware vCenter Update Manager to apply ESXi patches
• Use vCenter Server to manage vMotion, HA, DRS and data protection.
Course Overview:
This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).
Duration: 5 Days
Audience:
Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.
Course Prerequisites:
We recommend that attendees of this course have the following prerequisite:
• Network+
Dates/Locations:
Course Outline:
DAY ONE
Course Set Up and Analyzer Testing
Network Analysis Overview
Wireshark Functionality Overview
Capturing Wired and Wireless Traffic
Define Global and Personal Preferences for Faster Analysis
Defined Time Values and Interpret Summaries
Interpret Basic Trace File Statistics to Identify Trends
Create and Apply Display Filters for Efficient Analysis
DAY TWO
Follow Streams and Reassemble Data
Use Wireshark’s Expert System to Identify Anomalies
TCP/IP Analysis Overview
Analyze Common TCP/IP Traffic Patterns
DAY THREE
Graph I/O Rates and TCP Trends
802.11 (WLAN) Analysis Fundamentals
Voice over IP (VoIP) Analysis Fundamentals
Network Forensics Fundamentals
DAY FOUR
Detect Scanning and Discovery Processes
Analyze Suspect Traffic
DAY FIVE
Use Command‐Line Tools