Here are the General Unix course offerings:
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
- Getting started running commands
- Security cmdlets
- Using and updating the built-in help
- Execution policies
- Fun tricks with the ISE graphical editor
- Piping .NET and COM objects, not text
- Using properties and methods of objects
- Helping Linux admins feel more at home
- Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
- Customizing your profile script
- PowerShell remote command execution
- Security setting across the network
- File copy via PowerShell remoting
- Capturing the output of commands
- Parsing text files and logs with regex patterns
- Parsing Security Logs
- Searching remote event logs
- Mounting the registry as a drive
- Security settings in the Registry
- Exporting data to CSV, HTML and JSON files
- Running scripts as scheduled jobs
- Continued Security Compliance
- Pushing out scripts through Group Policy
- Importing modules and dot-sourcing functions
- http://www.PowerShellGallery.com
PowerShell Scripting
- PowerShell Scripting to implement Security Practices
- Writing your own functions to automate security status and settings
- Passing arguments into your scripts
- Function parameters and returning output
- Flow control: if-then, foreach, that make security decisions
- How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]
Course Overview:
This FastTrack course combines combines two VMware courses (VMware Cloud Essentials and vCloud Architecting the VMware Cloud) into a single week course that adds extra exercises and labs to exemplify the techniques presented. The course begins with how to adopt, operate, and govern the cloud. The course enables participants to successfully complete the associated CompTIA Cloud Essentials™ Exam to become a Cloud Essentials™ Professional(CEP). This course also covers the subject matter specified by the VCP-Cloud certification.
This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud environment. Detailed labs and exercises for VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. A comprehensive VMware cloud design is demonstrated and discussed.
Attendees to VM-335: VMware Cloud Essentials and vCloud – Architecting the VMware Cloud FastTrack will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Understand the common terms and definitions of cloud computing.
- Understand the business benefits and business considerations of cloud computing.
- Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
- Understand the impact and changes of cloud computing on IT service management.
- Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
- Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
- Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
- Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
- Design a network infrastructure optimized for vCloud.
- Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security rolesnderstand the common terms and definitions of cloud computing.
- Understand the business benefits and business considerations of cloud computing.
- Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
- Understand the impact and changes of cloud computing on IT service management.
- Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
- Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
- Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
- Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources.
- Design a network infrastructure optimized for vCloud.
- Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles.
- Design a vCenter Chargeback implementation.
Course Prerequisites:
- VM-315 or equivalent experience.
- Managing or administering at least one of UNIX, Windows, databases, networking, or security.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
Course Overview:
PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.
Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Packages and namespaces
- References and scoping
- Manipulating complex data structures
- Object-oriented programming
- Writing and using modules
- Testing PERL code
- Contributing to CPAN
Prerequisites:
- P-245: Programming with PERL or equivalent knowledge and skills
Comments
Latest comments from students
User: J Masters
Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.