TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
Course Overview:
This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.
Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Prepare to deploy cloud solutions
- Deploy a pilot project
- Test a pilot project deployment
- Design a secure network for cloud deployment
- Determine CPU and memory sizing for cloud deployments
- Plan Identity and Access Management for cloud deployments
- Analyze workload characteristics to ensure successful migration to the cloud
- Secure systems to meet access requirements
- Maintain cloud systems
- Implement backup, restore, and business continuity measures
- Analyze cloud systems for required performance
- Analyze cloud systems for anomalies and growth forecasting
- Troubleshoot deployment, capacity, automation, and orchestration issues
- Troubleshoot connectivity issues
- Troubleshoot security issues
Course Prerequisites:
- Security+, Network+, CASP or equivalent experience
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
No Events
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
Course Overview:
This hands-on course provides a comprehensive introduction to programming logic, and builds a solid foundation of programming skills that can be used to master additional programming languages like C, C++, PERL, Java or Python. To learn programming you must focus on a particular language, and we have chosen Java. In this course you will write and debug programs in Python. If you would like this course to use a different computer language, that can be arranged.
Attendees to PL-115: Fundamentals of Computer Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Writing Simple Programs Data Types, Constants, & Variables
- Screen Output & Keyboard Input
- Expressions
- Decision Making
- Looping
- Subroutines
- Debugging
- Data Collections – Arrays
- Data Collections – Classes Working with Files
Prerequisites:
- This course is for students starting out in programming. No programming experience is required.
Comments
Latest comments from students
User: tsonger
Instructor comments: While I could tell the instructor was very knowledgeable, his instructions were not very clear. He could've done a better job preparing for the class.
Facilities comments: Room was fine. The location of the room could have been better as the dings from the elevator were a bit distractive.
User: TracyPaul
Instructor comments: Very knowledgeable. Diagnosed our programming problems in short order. Could go into the details of 'why', versus only the 'how'.
Facilities comments: Outstanding. The hotel staff did a great job supporting our class.
Liked the class? Then let everyone know!
Course Overview:
This hands-on, lab-driven course directs managers, project managers, and team leaders through the real-world process of using SharePoint to propel projects. Improve efficiency and boost the likelihood of success as you learn to build a customized Project Management Information System (PMIS), develop SharePoint project sites, build document libraries and management protocols. You will integrate Microsoft Office software, build SharePoint Workflows, archive completed projects, and much more during SharePoint project management training. Add these critical SharePoint tools to your project management expertise and experience the drastic difference that comes with truly effective project management.
Attendees to TN-323: SharePoint 2010/2013 for Project Management will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 3 days
Course Objectives:
- SharePoint as a Project Management Information System (PMIS)
- Creating a PMIS
- Enabling Team Collaboration with SharePoint
- Tracking Projects with SharePoint
- Working with Business Intelligence
- Establishing Processes and Standards with SharePoint
- Managing Meeting with Meeting Workspaces
- Working with Microsoft Access
- Creating a PMO View
- Concluding a Project
Prerequisites:
Comments
Latest comments from students
User: joseibarra
Instructor comments: Very patient, communicated expertly. Made the class easy to understand and how it applies in the real world.
Facilities comments: Excellent.
Liked the class? Then let everyone know!