Here are the CompTIA Security course offerings:
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Accessing the Network
- Advanced Fuzzing Techniques
- Advanced Stack Smashing
- Attacking the Windows Domain – Enumeration
- Attacking the Windows Domain – Restricted Desktops
- Attacking the Windows Domain – The Attacks
- Building a Metasploit Module
- Crypto for Penetration Testers
- Exploiting the Network
- Fuzzing Introduction and Operation
- Introduction to Memory and Dynamic Linux Memory
- Introduction to Windows Exploitation
- Manipulating the Network
- Python and Scapy For Penetration Testers
- Shellcode
- Smashing the Stack
- Windows Heap Overflow Introduction
- Windows Overflows
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: ryanv Instructor comments: Great. Facilities comments: N/A. Hotel. User: sean.hollinger Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow. Facilities comments: adequate
Liked the class? Then let everyone know!
Course Overview:
Install, configure, and manage Red Hat JBoss Enterprise Application Platform
Red Hat JBoss® Application Administration I teaches you the best practices for installing and configuring Red Hat JBoss Enterprise Application Platform 6. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively deploy and manage applications on JBoss Enterprise Application Platform.
Attendees to RH-345: Red Hat JBoss Application Administration I, will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of JBoss Enterprise Application Platform
- Configure JBoss Enterprise Application Platform in standalone mode
- Configure JBoss Enterprise Application Platform in domain mode
- Configure servers
- Use the CLI tool
- The datasource subsystem
- The logging subsystem
- The messaging subsystem
- The security subsystem
- JVM configuration
- Migrating applications to JBoss Enterprise Application Platform 6
- The web subsystem
Prerequisites:
- Linux System Administration
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the exam. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.
Attendees to TN-939: Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 9 days
Course Objectives:
- Backdoors & Trojan Horses
- Buffer Overflows
- Covering Tracks: Networks
- Covering Tracks: Systems
- Denial of Service Attacks
- Exploiting Systems Using Netcat
- Format String Attacks
- Incident Handling Overview and Preparation
- Incident Handling Phase 2: Identification
- Incident Handling Phase 3: Containment
- Incident Handling: Recovering and Improving Capabilities
- IP Address Spoofing
- Network Sniffing
- Password Attacks
- Reconnaissance
- Rootkits
- Scanning: Host Discovery
- Scanning: Network and Application Vulnerability scanning and tools
- Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
- Scanning: Service Discovery
- Session Hijacking, Tools and Defenses
- Types of Incidents
- Virtual Machine Attacks
- Web Application Attacks
- Worms, Bots & Bot-Nets
Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: m_jurrens
Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.
User: natebonds
Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.
Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.
Liked the class? Then let everyone know!
Course Overview:
The focus of Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL110) will be managing OpenStack using both the web-based dashboard and the command-line interface, in addition to managing instances and installing a proof-of-concept environment using Red Hat OpenStack Platform (RHOSP) director. Essential skills covered in the course include configuring Red Hat OpenStack Platform (using the director UI); managing users, projects, flavors, roles, images, networking, and block storage; setting quotas; and configuring images at instantiation.
Attendees to CL-115 Red Hat OpenStack Administration I: Core Operations for Cloud Operators will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Prerequisites:
This course is designed for Linux system administrators, cloud administrators, and cloud operators interested in, or responsible for, maintaining a private or hybrid cloud.
Prerequisites for this course is Red Hat Certified System Administrator (RHCSA) or demonstrate equivalent experience
Course Outline:
- Launch an instance
- Manage projects, quotas, and users
- Manage networks, subnets, routers, and floating IP adresses
- Create and manage block and object storage in the OpenStack framework
- Customize instances with cloud-init
- Deploy scalable stacks
- Deploy RedHat OpenStack Platform using RHOSP director
Comments
Latest comments from students