Course Overview:

Linux System Administration II course is for experienced administrators ready for advanced administration topics. This course provides students with hands-on experience working with more complex and integrated administration concepts, and builds upon the Part 1 course. Students will be instructed in essential  local Red Hat system administration skills including: Logical Volumes, Raid Management, and System Logging, SELinux and Virtual Machines.  The Linux System Administration II course will get you started in understanding network administration topics, including monitoring, routing, Firewall with iptables, and servers such as NFS, SAMBA, DNS, SMTP, HTTP, DHCP, and Kickstart.

Attendees to RH-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Managing Logical Volumes and RAID
  • Network Routing, Filtering and Monitoring
  • Configuring File Sharing Across Platforms
  • Configuring Internet Services
  • Configuring Security
  • Configuring System Messaging
  • Using Name Services
  • Configuring Name Service Clients
  • Configuring Kickstart
  • Virtualization with KVM
  • Troubleshooting Boot Process

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Learn to comprehend and develop complex scenarios
  • Identify and create intelligence requirements through practices such as threat modeling
  • Utilize threat modeling to drive intelligence handling and practices 
  • Breakdown tactical, operational, and strategic-level threat intelligence
  • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
  • How to collect adversary information creating better value CTI
  • How to filter and qualify external sources, mitigating low integrity intelligence
  • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
  • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
  • Breaking down threats mapped against their tradecraft to tweak IOCs
  • Establish structured analytical techniques to be successful in any security role
  • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

Course Prerequisites:

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   

    Course Overview:

    A skills focus enables the student to better absorb the subject matter and perform successfully on the exam.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.

    Attendees to TN-939:  Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 9 days

    Course Objectives:

    • Backdoors & Trojan Horses
    • Buffer Overflows
    • Covering Tracks: Networks
    • Covering Tracks: Systems
    • Denial of Service Attacks
    • Exploiting Systems Using Netcat
    • Format String Attacks
    • Incident Handling Overview and Preparation
    • Incident Handling Phase 2: Identification
    • Incident Handling Phase 3: Containment
    • Incident Handling: Recovering and Improving Capabilities
    • IP Address Spoofing
    • Network Sniffing
    • Password Attacks
    • Reconnaissance
    • Rootkits
    • Scanning: Host Discovery
    • Scanning: Network and Application Vulnerability scanning and tools
    • Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
    • Scanning: Service Discovery
    • Session Hijacking, Tools and Defenses
    • Types of Incidents
    • Virtual Machine Attacks
    • Web Application Attacks
    • Worms, Bots & Bot-Nets

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: m_jurrens

    Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.


    User: natebonds

    Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.

    Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.


    Liked the class?  Then let everyone know!

      After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

      Scroll down to see the course description.

      First Name*

      Last Name*

      Your Email*

      Your Organization*

      Phone*

      Questions:

      After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Windows Security Automation and Threat Hunting with PowerShell Seminar

      Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

      Date: October 10, 2018 8:00am – 4:00pm

      Duration: 8 hours

      Audience: Cyber Security professionals and Windows administrators

      Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

      Description:
      PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

      Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

      Objectives:

      PowerShell Overview

      • Getting started running commands
      • Security cmdlets
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.

      PowerShell Utilities and Tips

      • Customizing your profile script
      • PowerShell remote command execution
      • Security setting across the network
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Parsing Security Logs
      • Searching remote event logs
      • Mounting the registry as a drive
      • Security settings in the Registry
      • Exporting data to CSV, HTML and JSON files
      • Running scripts as scheduled jobs
      • Continued Security Compliance
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

      PowerShell Scripting

      • PowerShell Scripting to implement Security Practices
      • Writing your own functions to automate security status and settings
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, foreach, that make security decisions
      • How to pipe data in/out of your scripts for security compliance and reporting

      Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]