In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.
Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
Planning Routing Services to Requirements
Implementing an EIGRP-Based Solution
Implementing a Scalable Multiarea Network
OSPF-Based Solution
Implement an IPv4- Based Redistribution Solution
Implementing Path Control Connection of an Enterprise Network to an ISP Network
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.
Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
Governance & Management of IT (18%)
This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
Information Systems Acquisition, Development & Implementation (12%)
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
Information Systems Operation & Business Resilience (26%)
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.s.
Protection of Information Assets (26%)
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
This course is developed for those individuals seeking to pass the Project Management Institute’s PMI-ACP Exam. PMI Agile Certified Practitioner (PMI-ACP)® is one of the newest certifications offered by PMI and is expected to become the industry standard certification for agile over the next few years. The PMI-ACP® certification clearly illustrates to colleagues, organizations or even potential employers that students are ready and able to lead in this new age of product development, management, and delivery.
While preparing you for the exam, you will explore various approaches to agility including Scrum, Kanban, Lean, Extreme Programming (XP), and Test-Driven Development (TDD). By the end of the course, you’ll have mastered the practices and techniques that Agile practitioners use to improve team performance, resolve problems and engage in continuous process improvements and be equipped with job-ready skills.
This course provides students with 21 contact hours in agile practices to help attain the Project Management Institute (PMI)® credential. PMI® and PMI-ACP® are registered marks of the Project Management Institute, Inc.
Attendees to PM-224: PMI Agile Certified Practitioner (PMI-ACP) Prep Course will receive TechNow approved course materials and expert instruction.
12 months of general project experience within the last 5 years. A current PMP® or PgMP® will satisfy this requirement but is not required to apply for the PMI-ACP
8 months of agile project experience within the last 3 years
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
5 days of instructor-led in classroom training
Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
CHFI Courseware
Exam Voucher
CHFI onsite exam scheduling
Course Objectives:
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
Identify & check the possible source/ incident origin
Recover deleted files and partitions in Windows, MAC OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.