Here are the CompTIA Security course offerings:
Course Overview:
SharePoint is the Premier Office Collaboration Server Suite. Two of the most requested features to implement in any SharePoint Server environment is building custom workflows and incorporating InfoPath forms into the site. This course aims to build the average user’s body of knowledge and skill set to allow them to take on some of this responsibility. Students will learn the SharePoint Designer software, a free product, to do these tasks.
Over the course of the two days the users will work on a live SharePoint Server environments making changes to pages, adding pages and making Workflows. They will learn how to build InfoPath forms and migrate them to the SharePoint environment.
Attendees to TN-5202: Microsoft SharePoint 2010/2013: Workflows and Designing InfoPath Forms will receive TechNow approved course materials and expert instruction.
Duration: 2 days
Course Objectives:
- Identify the basic features of the SharePoint Designer environment.
- Create a new subsite.
- Add content to a web page.
- Use Cascading Style Sheets to format a SharePoint site.
- Link web pages.
- Add SharePoint components to the site.
- Automate business processes with workflows.
- Create InfoPath forms.
- Import and export forms.
- Customize a form layout.
- Distribute forms.
- Work with a database.
Prerequisites:
- Knowledge of HTML not required, but helpful
- Basic Computer Skills
Comments
Latest comments from students
User: golf123
Instructor comments: Mr. Moore knew and presented the course very well. I would definitely take future courses with TechNow.
Liked the class? Then let everyone know!
Course Overview: Clear and detailed discussion on the following course content:
- What is the Agile Adaptive Methodology versus the Predictive (waterfall) Methodology?
- The Agile Value Proposition, by explanation of the Agile Manifesto and Agile Principles.
- What is the Scrum Framework by explanation of Scrum Roles, Ceremonies and Artifacts?
- What are the artifacts of Product Planning, Release Planning and Sprint Planning?
- What are the Agile impacts to corporate team structures and stakeholder alignment?
- What are Agile myths and why an Agile transformation will fail?
- What are Agile (hybrid) tailoring considerations?
Attendees to PM-221: Agile Overview for Executives and Leaderswill receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 1 Days
Course Objectives: Are you and executive or leader in your organization and interested in learning about Agile principles? This course details the Agile framework that uses an adaptive life cycle, specifically related to using the Scrum approach.
Upon successful completion of this course, students will be able to:
- Understand an overview of the main aspects that leadership must know to implement strategic opportunities with Agile principles for product quality and on-time product delivery
- Participants will dive into understanding the strategic and tactical elements of implementing Agile and Scrum into their organization
- Receive details on how to understand the organizational impact that the Agile transformation could have on the different aspects of your current business processes
Target Student:
- Designed specifically for leaders and senior managers or anyone wanting to understand the high-level basics of the Agile Framework
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Certified in Risk and Information Systems Control (CRISC), is for professionals responsible for an organization's risk management program. Students looking to acquire CRISC qualify themselves as IT security analyst, security engineer architect, information assurance program manager and senior IT auditor. CRISC certified professionals manage risk, design and oversee response measures, monitor systems for risk, and ensure the organization's risk management strategies are met.
The CRISC exam will primarily align with the terminology and concepts described in The Risk IT Framework, The Risk IT Practioner Guide, and COBIT 5. This will include applications in the evaluation and monitoring of IT-based risk, as well as the design and implementation of IS controls.
The CRISC exam covers four domains that are periodically updated to reflect the changing needs of the profession:
- Domain 1: Risk Identification
- Domain 2: Risk Assessment
- Domain 3: Risk Response and Mitigation
- Domain 4: Risk and Control Monitoring and Reporting
This course is designed to assist in your exam preparation for the CRISC exam.
Attendees to TN-835: Certified in Risk and Information Systems Control (CRISC) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Risk IT Framework—Purpose and Principles
- Essentials of Risk Governance, Evaluation, and Response
- Risk and Opportunity Management Using CobiT, Val IT and Risk IT
- The Risk IT Framework Process Model Overview
- Managing Risk in Practice—The Practitioner Guide Overview
- Overview of the Risk IT Framework Process Model
- The Risk IT Framework
Prerequisites:
A minimum of at least three (3) years of cumulative work experience performing the tasks of a CRISC professional across at least three (3) CRISC domains is required for certification. There are no substitutions or experience waivers.
Comments
Latest comments from students
User: tracycampbell
Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.
Facilities comments: The Home2Suites by Hilton was FANTASTIC!
Liked the class? Then let everyone know!
Course Overview:
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).
Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
- Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
- Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
- Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
- Optimize OSPFv2 and OSPFv3 behavior
- Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
- Implement route redistribution using filtering mechanisms
- Troubleshoot redistribution
- Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
- Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
- Optimize MP-BGP in IPv4 and IPv6 environments
- Troubleshoot MP-BGP for IPv4 and IPv6
- Describe the features of Multiprotocol Label Switching (MPLS)
- Describe the major architectural components of an MPLS VPN
- Identify the routing and packet forwarding functionalities for MPLS VPNs
- Explain how packets are forwarded in an MPLS VPN environment
- Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
- Implement Dynamic Host Configuration Protocol (DHCP)
- Describe the tools available to secure the IPV6 first hop
- Troubleshoot Cisco router security features
- Troubleshoot infrastructure security and services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of network fundamentals
- Basic knowledge of how to implement LANs
- General understanding of how to manage network devices
- General understanding of how to secure network devices
- Basic knowledge of network automation
Comments
Latest comments from students