The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must.  TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development. 

Here is a list of all of our Microsoft courses:

    in   

    TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

    Here are courses about specilaized Software or Hardware:

      in   
       

      Course Overview:

      Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

      Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      No Events

      Duration: 5 Days

      Course Objectives:

      • Introduction to Pen Testing using the PTES model
      • Metasploit Basics
        • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
      • Intelligence Gathering
        • Nmap, Databases in Metasploit, Port Scanning with Metasploit
      • Quick Intro to Ruby
        • Writing a simple Ruby script to create a custom scanner
      • Vulnerability Scanning
        • Importing Nessus Results
        • Scanning with Nessus from Within Metasploit
      • Exploitation
        • Using the Metasploit Framework and console to exploit
      • Meterpreter
        • Compromising a Windows System
        • Attacking MS SQL, xp_cmdshell
        • Dumping Usernames and Passwords, extracting and dumping hashes
        • Pass the Hash and Token Impersonation
        • Pivoting
        • Railgun
        • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
      • Avoiding Detection
        • Creating Stand-Alone Binaries with MSFpayload
        • Encoding with MSFencode and Packers (go Green Bay:)
      • Exploitation Using Client Side Attacks
        • Introduction to Immunity Debugger
        • Using Immunity Debugger to Decipher NOP Shellcode
      • Metasploit Auxiliary Modules
      • Social Engineer Toolkit (SET)
        • Spear-Phishing, Web Attack
        • Creating a Multipronged Attack
      • Creating Your Own Module
        • Adapt an existing Module
        • Add some PowerShell and Run the Exploit
      • Meterpreter Scripting
      • Capture The Flag Exercise

      Prerequisites:

      • This is an advanced Information Security Course which requires basic Windows & UNIX competency
      • Certification or 2 years of experience in these operating systems is highly recommended
      • An understanding of TCP/IP

      Comments

      Latest comments from students


      User: dhonore

      Instructor comments: Dave's presentation style is engaging and lively.

      Facilities comments: The room was adequate for the needs of the class.


      User: phouck

      Instructor comments: David was very good. Although he went very fast at times.

      Facilities comments: The room was ok. it was bit dark.


       

      Liked the class?  Then let everyone know!

      Course Overview:

      This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

      Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      No Events

      Duration: 5 Days

      Course Objectives:

      • Systems Security Engineering
      • Certification and Accreditation
      • Technical Management
      • U.S. Government Information Assurance Governance

      Prerequisites:

      Comments

      Latest comments from students


      User: fsarisen

      Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


      User: storoy30

      Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


      Liked the class?  Then let everyone know?

      Course Overview:

      In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.

      Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Objectives:

      • Planning Routing Services to Requirements
      • Implementing an EIGRP-Based Solution
      • Implementing a Scalable Multiarea Network
      • OSPF-Based Solution
      • Implement an IPv4- Based Redistribution Solution
      • Implementing Path Control Connection of an Enterprise Network to an ISP Network

      Prerequisites:

      • None

       

      Comments

      Latest comments from students


      User: jrtrussell

      Instructor comments: Awesome

      Facilities comments: Awesome


      Liked the class?  Then let everyone know!