Course Overview:
TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI. This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .
TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams. Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI. As with many advanced TechNow security courses, there is a large hands-on ratio. This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries. CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.
This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. . MDT puts us close the mission and helps define the internal context to be analyzed against the CTI. TechNow pushes the student to truly understand how to think about and use CTI to make a difference.
Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Learn to comprehend and develop complex scenarios
- Identify and create intelligence requirements through practices such as threat modeling
- Utilize threat modeling to drive intelligence handling and practices
- Breakdown tactical, operational, and strategic-level threat intelligence
- Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
- How to collect adversary information creating better value CTI
- How to filter and qualify external sources, mitigating low integrity intelligence
- Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
- Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
- Breaking down threats mapped against their tradecraft to tweak IOCs
- Establish structured analytical techniques to be successful in any security role
- Learn and apply structured principles in support of CTI and how to communicate that to any security role.
Course Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This three-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.
NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment
Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 3 days
Course Outline:
- Cloud Concepts
- Core Azure Services
- Security, Privacy, Compliance, And Trust
- Azure Pricing and Support
Lab Objectives:
-
- Create a virtual machine
- Deploy Azure container instances
- Create a virtual network
- Create blob storage
- Create a SQL database
- Implement an Azure IoT Hub
- Implement Azure Functions
- Create a web app
- Create a VM with a Template
- Create a VM with PowerShell
- Create a VM with CLI
- Secure network traffic
- Implement Azure key vault
- Create an Azure Policy
- Manage access with RBAC
- Manage resource locks
- Implement resource tagging
- Exploring the Trust Center
- Use the Azure Pricing Calculator
- Use the Azure TCO Calculator
- Open a Support request
- Calculate composite SLAs
- Access Azure Preview features
Prerequisites :
-
-
- There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
- This course is suitable for IT personnel who are just beginning to work with Azure.
- This course primarily uses the Azure portal to create services and does not require scripting skills.
- Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
- This course provides an Azure pass and optional lab environment.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This is a hands-on course that covers many of the concepts of securing the perimeter of an organization. This includes concepts such as intrusion detection, packet filtering, and central logging.
A skills focus enables the student to better absorb the subject matter and perform better on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Firewalls.
This course is an excellent precursor to PA-215 Palo Alto Firewall Essentials FastTrack.
Attendees to TN-949: Certified Firewall Analyst Prep will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
- Analyzing Network and Wireless Design
- Creating and Auditing a Rulebase
- Firewall Assessment and Penetration Testing
- Host-Based Detection and DLP
- Incident Detection and Analysis
- IOS and Router Security
- IPv6 and ICMPv6
- Log Collection and Analysis
- NAT and Proxies
- Netfilter IPtables
- Network Access Control
- Network-Based Intrusion Detection
- Packet Filters and Inspection
- Packet Fragmentation
- Perimeter Concepts and IP Fundamentals
- Securing Hosts and Services
- TCP/IP Protocols
- VPN Design and Auditing
- VPN Implementation
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
Liked the class? Then let everyone know!
Increase your credibility, job security, and career opportunities by reaching your goal and getting certified! TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class. We have a proven testing program that will get you the results you want!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294