Course Overview:
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- VoIP Architecture
- VoIP Signaling and media protocols
- Common VoIP authentication mechanisms
- Common VoIP encryption techniques
- VoIP protocol analysis with Wireshark
- Maintaining QoS while mitigating DoS
- VoXML, XML, and application integration security
- Converged network security design and implementation
- Impact of NAT and firewalls
- SIP, H.323, and MGCP vulnerabilities
- VPN, IPsec and SRTP to secure VoIP services
- Penetration testing with open source tools
- Attacks for Eavesdropping, call redirection, and DoS
- Design of hacked firmware virtualization layer
- Concise lockdown steps for network hardware and VoIP
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- As well as an understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.
Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.
Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Introduction to Privacy Program Management
- Module 2: Privacy Governance
- Module 3: Applicable Laws and Regulations
- Module 4: Data Assessments
- Module 5: Policies
- Module 6: Data Subjects’ Rights
- Module 7: Training and Awareness
- Module 8: Protecting Personal Information
- Module 9: Data Breach Incident Plans
- Module 10: Measuring, Monitoring and Auditing Program Performance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow offers the full gamut of programming languages from ANSI C and C++ to the various Microsoft .Net languages (Visual Basic, C# and C++). If you are completely new to programming, TechNow offers courses that demonstrate the fundamentals to get you started.
If you prefer Unix/Linux, we offer Shell Programming, as well as, Perl and Python. We also offer courses in the web development languages, such as, Java Servlets, JSP, and ASP .Net.
The following is a list of our Programming training courses:
- C-215: Introduction to C Programming
- C-225: C++ Object Oriented Programming
- MS-2124: Programming with C#
- P-245: Programming with PERL
- P-315: Intermediate PERL Programming
- P-325: Python Programming
- P-415: Advanced PERL Programming
- PL-115: Fundamentals of Computer Programming
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-345: Python for Penetration Testers
- TN-430: Elasticsearch Engineer (ELK)
- TN-965 Windows Security Automation with Powershell
Course Overview:
SecurityX® (formerly known as CASP+) course prepares you for the CompTIA SecurityX® certification exam (CVO-005) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. This course will prepare students for the objectives covered in the CompTIA SecurityX certification exam (CVO-005).
Attendees to CT-425: CompTIA SecurityX will receive TechNow approved course materials and expert instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
03/09/2026 - 03/13/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
06/08/2026 - 06/12/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
08/31/2026 - 09/04/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
11/30/2026 - 12/04/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Support IT governance in the enterprise with an emphasis on managing risk
- Leverage collaboration tools and technology to support enterprise security
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for mobile devices
- Implement network security
- Implement security in the systems and software development lifecycle
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
- Conduct security assessments
- Respond to and recover from security incidents
Prerequisites:
Completion of the following or equivalent knowledge:
Minimum of 10 years general hands on IT experience
5 years being hands-on security
CompTIA Certification: Network+
CompTIA Certification: Security+
CompTIA Certification: CySA+
OR equivalent knowledge
Comments
Latest comments from students
User: clbrack
Instructor comments: I expect to pass, another great class from technow!
User: christopher0470
Instructor comments: Alan takes the time to cover the material so that you understand the concepts and applications of the information presented.
Facilities comments: I like the location. It was quiet and very conducive to learning.
