DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


 

 

For further information or to schedule for classes, call us at 800-324-2294

 

in   
 

Course Overview:

TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam.  The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.

This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try.  We encourage our students to take the exam within a week after course completion.  The goal for this course is a pass rate of one and done.  Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days.  TechNow has a proven CISSP track record that you can depend on.

Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

 

Unix Course Flow

Dates/Locations:

No Events

Duration: 10 Days

Course Objectives:

Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security) 

Prerequisites:

To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:

  • 4 years of experience in the information security field
  • or 3 years experience & a college degree 

Contact TechNow to verify that you qualify.

Comments

Latest comments from students


Facilities comments:


User: pulliamp

Instructor comments:


Liked the class?  Then let everyone know!

 

 

 

 

Course Overview:

Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.

If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.

This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.

Dates/Locations:

No Events

Duration: 10 Days

Course Content:

    • Module 01. Installing Windows
    • Module 02. Updating Windows
    • Module 03. Post-Installation Configuration and Personalization
    • Module 04. Configuring Peripherals and Drivers
    • Module 05. Configuring Networks
    • Module 06. Configuring Storage
    • Module 07. Managing Apps in Windows 10
    • Module 08. Configuring Authorization & Authentication
    • Module 09. Configuring Data Access and Usage
    • Module 10. Configuring Advanced Management Tools
    • Module 11. Supporting the Windows 10 Environment
    • Module 12. Troubleshooting the Windows OS
    • Module 13. Troubleshooting Files & Applications
    • Module 14. Troubleshooting Hardware and Drivers
    • Module 15. Planning an Operating System Deployment Strategy
    • Module 16. Implementing Windows 10
    • Module 17. Managing Updates for Windows 10
    • Module 18. Device Enrollment
    • Module 19. Configuring Profiles
    • Module 20. Application Management
    • Module 21. Managing Authentication in Azure AD
    • Module 22. Managing Devices and Device Policies
    • Module 23. Managing Security

 

Prerequisites:

      • Microsoft 365 Certified Fundamentals (M-MS900)

Target Audience:

IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

  

Course Overview: 

Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Pen Testing using the PTES model
  • Metasploit Basics
    • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
  • Intelligence Gathering
    • Nmap, Databases in Metasploit, Port Scanning with Metasploit
  • Quick Intro to Ruby
    • Writing a simple Ruby script to create a custom scanner
  • Vulnerability Scanning
    • Importing Nessus Results
    • Scanning with Nessus from Within Metasploit
  • Exploitation
    • Using the Metasploit Framework and console to exploit
  • Meterpreter
    • Compromising a Windows System
    • Attacking MS SQL, xp_cmdshell
    • Dumping Usernames and Passwords, extracting and dumping hashes
    • Pass the Hash and Token Impersonation
    • Pivoting
    • Railgun
    • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
  • Avoiding Detection
    • Creating Stand-Alone Binaries with MSFpayload
    • Encoding with MSFencode and Packers (go Green Bay:)
  • Exploitation Using Client Side Attacks
    • Introduction to Immunity Debugger
    • Using Immunity Debugger to Decipher NOP Shellcode
  • Metasploit Auxiliary Modules
  • Social Engineer Toolkit (SET)
    • Spear-Phishing, Web Attack
    • Creating a Multipronged Attack
  • Creating Your Own Module
    • Adapt an existing Module
    • Add some PowerShell and Run the Exploit
  • Meterpreter Scripting
  • Capture The Flag Exercise

Prerequisites:

  • This is an advanced  Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • An understanding of TCP/IP

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

 

Course Overview:

Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Pen Testing using the PTES model
  • Metasploit Basics
    • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
  • Intelligence Gathering
    • Nmap, Databases in Metasploit, Port Scanning with Metasploit
  • Quick Intro to Ruby
    • Writing a simple Ruby script to create a custom scanner
  • Vulnerability Scanning
    • Importing Nessus Results
    • Scanning with Nessus from Within Metasploit
  • Exploitation
    • Using the Metasploit Framework and console to exploit
  • Meterpreter
    • Compromising a Windows System
    • Attacking MS SQL, xp_cmdshell
    • Dumping Usernames and Passwords, extracting and dumping hashes
    • Pass the Hash and Token Impersonation
    • Pivoting
    • Railgun
    • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
  • Avoiding Detection
    • Creating Stand-Alone Binaries with MSFpayload
    • Encoding with MSFencode and Packers (go Green Bay:)
  • Exploitation Using Client Side Attacks
    • Introduction to Immunity Debugger
    • Using Immunity Debugger to Decipher NOP Shellcode
  • Metasploit Auxiliary Modules
  • Social Engineer Toolkit (SET)
    • Spear-Phishing, Web Attack
    • Creating a Multipronged Attack
  • Creating Your Own Module
    • Adapt an existing Module
    • Add some PowerShell and Run the Exploit
  • Meterpreter Scripting
  • Capture The Flag Exercise

Prerequisites:

  • This is an advanced Information Security Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • An understanding of TCP/IP

Comments

Latest comments from students


User: dhonore

Instructor comments: Dave's presentation style is engaging and lively.

Facilities comments: The room was adequate for the needs of the class.


User: phouck

Instructor comments: David was very good. Although he went very fast at times.

Facilities comments: The room was ok. it was bit dark.


 

Liked the class?  Then let everyone know!