Here are our Microsoft Programming courses:
Course Overview:
The C-215: Introduction to C Programming course is a hands-on course providing a complete introduction to the ANSI C programming language, focusing on quickly developing the practical skills needed to create real-world solutions. Our hands-on labs are designed to promote retention and challenge students to apply their skills to new situations.
Attendees to C-215: Introduction to C Programming will receive TechNow approved course materials and expert instruction.
Duration: 5 days
Course Objectives:
- What is C?
- Basics of Program Writing
- Style
- Basic Declarations & Expressions
- Arrays, Qualifiers & Reading Numbers
- Decision & Control Statements
- Programming Process
- More Controls Statements
- Variable Scope & Functions
- C Preprocessor
- Bit Operations
- Advanced Types
- Simple Pointers
- File Input/Output
- Debugging & Optimization
- Floating Point
Prerequisites:
Before attending this course, you should be able to use basic UNIX commands and have previous programming experience language, or have taken our Introduction to Computer Progamming class.
Comments
Latest comments from students
User: jangles1337
Instructor comments: Pretty knowledgeable on a number of things. Could have had a better in depth understanding of the material.
Facilities comments: Was a hotel so it was pretty noisy some times.
User: ldorsey
Instructor comments: Great guy full of knowledge
Liked the class? Then let everyone know!
DoD 8570 Training
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.
- CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar
- CT-205: A+ Certification Course
- CT-208: A+ Extended Boot Camp
- CT-225: Network+
- CT-325: Security+
- CT-395: CySA+ Cybersecurity Analyst
- CT-425: CompTIA SecurityX
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-545: Certified Network Defender
- TN-555: Certified Ethical Hacker v13 (CEH)
- TN-715: Systems Security Certified Practitioner (SSCP)
- TN-812: Information Systems Security Engineering Professional (ISSEP)
- TN-813: Certified in Governance, Risk and Compliance (CGRC)
- TN-8150: CISSP Certification Preparation Seminar
- TN-822: Certified Information Systems Auditor (CISA) Seminar
- TN-825: Certified Information Security Manager (CISM) Seminar
- TN-835: Certified in Risk and Information Systems Control (CRISC) Preparation Seminar
- TN-865: Wireshark Network Traffic and Security Analysis
For further information or to schedule for classes, call us at 800-324-2294
Course Overview:
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies is the big picture overview of a SOC, other courses provide a deep dive into the technologies that a SOC may utilize. This course addresses the internal workings of staff, skills required, required authorizations, internal agreements, and setting appropriate expectation levels of a SOC within budget constraints. A SOC is not a one size fits all, the instructor has decades of security experience and brings to the table opportunities to discuss what can work within constraints. Many organizations are coming to the realization that some level of a SOC is now required and to learn just what decisions need to be made: Out-sourced, In-sourced, budgets, capabilities and many more. Students leave with a worksheet of how to progress when they get back to their organization.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies – Is a course that incorporates lecture, demos, and group exercises for standing up a Security Operations Center (SOC). Students learn strategies and resources required to deploy, build, and run Network Security Monitoring (NSM) and work roles and flows for a SOC. No network is bullet proof and when attackers access your network, this course will show you options and resources to build a security net to detect, contain, and control the attacker. Examples on what it takes to architect an NSM solution to identify sophisticated attackers and a response strategy. Properly implemented detection and response technologies is integral to incident response and provides the responders timely information and tools to react to the incident. Effective demonstrations are given of Open Source technologies that build up a SOC, but any software can be used and demonstrations are provided to demonstrate technology families not push a specific solution.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies demonstrations utilize a cyber range that gives each student in-depth knowledge of monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls; and software and services to provide orchestrate Incident Response, Intelligence Analysis, and Hunt Operations.
Attendees to TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objective:
-
- To provide management an overview of what it takes to stand up a SOC.
Prerequisites:
- Students should have an understanding of the security field.
Course Outline:
- What threats does my organization care about?
- What does a threat look like?
- What does a threat look like?
- How to present the SOC internally.
- Communication with Stakeholders and Executives Leveraging and integrating existing security measures
- People
- Establishing a skill matrix and work roles for SOC members
- Establishing a training path
- Personnel background requirementsProcesses
- Processes
- Alignment to standards: NIST, PCI, HIPAA, etc.
- Risk related decision trees
- Playbooks
- Threat Intelligence Integration
- Technology – Tool Suites to Support:
- Ethical Hacking
- Network Security Monitoring and SIEM
- Forensics
- Dashboards
- Analysis and Hunting
- Incident Management and Ticketing
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview: PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Class is a three-day course that teaches students to configure and manage the entire line of Palo Alto Networks next-generation firewalls. This course prepares the student for the Palo Alto Networks Accredited Configuration Engineer (ACE) and progress to the Palo Alto Networks Certified Network Security Engineer (PCNSE). Through hands-on training, students learn high end skills of how to integrate Palo Alto next-generation firewalls into their network infrastructure. This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
This course sets up the foundation for the two day course PA-212: Palo Alto Networks Firewall Configure Extended Features. The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.
Attendees to the PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Course will receive TechNow approved course materials and expert instruction.
TechNow PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205) immediately follows this course in the schedule so that you can take both courses in the same week. We also offer a discount for attending both classes in the same week!!
Dates/Locations:
Duration: 3 days
Course Objectives: Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS).
Day 1
|
Day 2
|
Day 3
|
Prerequisites:
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students