Here are the CompTIA Security course offerings:
Course Overview:
Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.
If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.
This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.
Dates/Locations:
No Events
Duration: 10 Days
Course Content:
-
- Module 01. Installing Windows
- Module 02. Updating Windows
- Module 03. Post-Installation Configuration and Personalization
- Module 04. Configuring Peripherals and Drivers
- Module 05. Configuring Networks
- Module 06. Configuring Storage
- Module 07. Managing Apps in Windows 10
- Module 08. Configuring Authorization & Authentication
- Module 09. Configuring Data Access and Usage
- Module 10. Configuring Advanced Management Tools
- Module 11. Supporting the Windows 10 Environment
- Module 12. Troubleshooting the Windows OS
- Module 13. Troubleshooting Files & Applications
- Module 14. Troubleshooting Hardware and Drivers
- Module 15. Planning an Operating System Deployment Strategy
- Module 16. Implementing Windows 10
- Module 17. Managing Updates for Windows 10
- Module 18. Device Enrollment
- Module 19. Configuring Profiles
- Module 20. Application Management
- Module 21. Managing Authentication in Azure AD
- Module 22. Managing Devices and Device Policies
- Module 23. Managing Security
Prerequisites:
-
-
- Microsoft 365 Certified Fundamentals (M-MS900)
-
Target Audience:
IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
In this course-currently the only offering in the market devoted to Group Policy training-you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.
Attendees to TN-5455: Managing Windows Environments with Group Policy will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Features and functions of Group Policy
- Use Group Policy management tools to manage security policies
- Design a Group Policy infrastructure
- Group Policy processing architecture
- Back up, restore, import, and copy Group Policy Objects through the Group Policy
- Management Console
- Use Windows PowerShell to manage Group Policy
- Implement security using Group Policy
- Configure the desktop environment with Group Policy
- Configure roaming profiles and Folder Redirection
- Assign and publish software packages
- Implement AppLocker and software restriction policies
- Create and deploy Administrative Templates
- Configure Group Policy preferences
Course Prerequisites:
- Experience with the Microsoft Windows Server 2008/12 environments and a fundamental understanding of Active Directory
Comments
Latest comments from students
Liked the class? Then let everyone know!
Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized