Here are the General Unix course offerings:
Here are the security courses specific to TechNow:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- N-595: VoIP Security Analysis and Design
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-8155: HCISPP Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-963: Windows Security Automation with PowerShell
Course Overview:
TechNow understands the security threats that make your network & your company vulnerable. We have developed a program to help you learn what those threats are, the kinds of defenses available, the language of Network Security, & how to organize yourself internally to deal with these Network Security issues. TechNow's Corporate Risk Management course will give your team the fundamental skills & knowledge they need to develop, manage or implement your organization's Information Security Policy.
Attendees to TN-804: Corporate Risk Management will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 4 Days
Course Objectives:
- Day 1
- Chapter 1: What is information Security
- Chapter 2: Types of Attacks
- Chapter 3: Information Security Services
- Chapter 4: Legal Issues
- Chapter 5: Policy
- Day 2
- Chapter 6: Managing Risk
- Chapter 7: Information Security Process
- Chapter 8: Information Security Best Practices
- Chapter 9: Internet Architecture
- Chapter 10: Virtual Private Networks
- Day 3
- Chapter 11: E-Commerce Security Needs
- Chapter 12: Encryption
- Chapter 13: Hacker Techniques
- Chapter 14: Intrusion Detection
- Day 4
- Chapter 15: UNIX Security Issues
- Chapter 16: Windows Security Issues
- Open Discussion
Prerequisites:
- Basic computer literacy.
Comments
Latest comments from students