Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.
Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Systems Security Engineering
- Certification and Accreditation
- Technical Management
- U.S. Government Information Assurance Governance
Prerequisites:
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone know?
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to Support and Troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.
Attendees to TN-5320: Supporting and Troubleshooting Windows 11 will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Describe the processes involved in planning and using a troubleshooting methodology for Windows 11
- Troubleshoot startup issues and operating system services on a Windows 11 PC
- Perform system recovery
- Resolve issues related to hardware devices and device drivers
- Administer Windows 11 devices
- Troubleshoot issues related to network connectivity
- Configure Windows 11 devices by using Group Policy
- Configure and troubleshoot user settings
- Configure and troubleshoot resource access
- Implement remote connectivity
- Deploy and troubleshoot applications
- Maintain Windows 11 devices
Prerequisites:
- Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS).
- Microsoft Active Directory Domain Services (AD DS) principles.
- Understanding of the Public Key Infrastructure (PKI) components.
- Windows Server fundamentals.
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
-
-
- Pass the CEH exam
- Pass the CND exam
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!