Course Overview:
This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).
Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.
Date/Location:
Duration: 5 days
Course Objectives:
- Designing a Logical Architecture
- Planning Service Application Architecture
- Planning for Performance and Capacity
- Designing a Physical Architecture
- Designing a Security Plan
- Planning Authentication
- Planning Managed Metadata
- Planning Social Computing
- Designing Enterprise Search Strategy
- Planning Enterprise Content Management
- Developing a Plan for Governance
- Designing a Maintenance and Monitoring Plan
Prerequisites:
- At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
- At least one year’s experience of mapping business requirements to logical and physical technical design
- Working knowledge of network design, including network security
Comments
Latest comments from students
Liked the class? Then let others know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
-
-
- Pass the CEH exam
- Pass the CND exam
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course provides students with the knowledge and skills to implement a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to implementing a database.
Attendees to MS-6232: Implementing a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Creating Databases and Databases Files
- Creating Data Types and Tables
- Creating and Tuning Indexes
- Implementing Data Integrity by Using Constraints and Triggers
- Using XML
- Implementing Views
- Implementing Stored Procedures
- Implementing Functions
- Implementing Managed Code in the Database
- Managing Transactions and Locks
- Using Service Broker
Prerequisites:
- Basic knowledge of the Microsoft Windows operating system and its core functionality
- Working knowledge of Transact-SQL
- Working knowledge of relational databases
- Some experience with database design
Comments
Latest comments from students
User: bangbangsplat
Instructor comments: some kind of presentation would have been helpful in learning the objectives of the course (PowerPoint, drawing on easel, etc.) It seemed like the instructor is not too familiar with the error codes we were receiving during the Practice Exams.
Facilities comments: preferred to have the location located in a less busy area of the city
User: smaxam
Instructor comments: Clay was very knowledgable but had to repeat questions a number of times to get his attention.
Facilities comments: Holiday Inn was nice
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.