CCFE Core Competencies

  • Procedures and Legal Issues
  • Computer Fundamentals
  • Partitioning Schemes
  • Data Recovery
  • Windows File Systems
  • Windows Artifacts
  • Report writing (Presentation of Finding)
  • Procedures and Legal issues
  1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
  2. Ability to explain the on-scene action taken for evidence preservation.
  3. Ability to maintain and document an environment consolidating the computer forensics.
  • Computer Fundamentals
  1. Understand BIOS
  2. Computer hardware
  3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
  4. Knowledge of sectors, clusters, files.
  5. Understanding of logical and physical files.
  6. Understanding of logical and physical drives.
  • Partitioning schemes
  1. Identification of current partitioning schemes.
  2. Understanding of primary and extended partition.
  3. Knowledge of partitioning schemes and structures and system used by it.
  4. Knowledge of GUID and its application.
  • Windows file system
  1. Understanding of concepts of files.
  2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
  3. Identification, examination, analyzation of NTFS master file table.
  4. Understanding of $MFT structure and how they store data.
  5. Understanding of Standard information, Filename, and data attributes.
  • Data Recovery
  1. Ability to validate forensic hardware, software, examination procedures.
  2. Email headers understanding.
  3. Ability to generate and validate forensically sterile media.
  4. Ability to generate and validate a forensic image of media.
  5. Understand hashing and hash sets.
  6. Understand file headers.
  7. Ability to extract file metadata from common file types.
  8. Understanding of file fragmentation.
  9. Ability to extract component files from compound files.
  10. Knowledge of encrypted files and strategies for recovery.
  11. Knowledge of Internet browser artifacts.
  12. Knowledge of search strategies for examining electronic
  • Windows Artifacts
  1. Understanding the purpose and structure of component files that create the windows registry.
  2. Identify and capability to extract the relevant data from the dead registry.
  3. Understand the importance of restore points and volume shadow copy services.
  4. Knowledge of the locations of common Windows artifacts.
  5. Ability to analyze recycle bin.
  6. Ability to analyze link files.
  7. Analyzing of logs
  8. Extract and view windows logs
  9. Ability to locate, mount and examine VHD files.
  10. Understand the Windows swap and hibernation files.
  • Report Writing (Presentation of findings)
  1. Ability to conclude things strongly based on examination observations.
  2. Able to report findings using industry standard technically accurate terminologies.
  3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
  4. Be able to consider legal boundaries when undertaking a forensic examination

Course Overview:

The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).

Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.

Dates/Locations:

Date/Time Event
03/16/2026 - 03/20/2026
08:00 -16:00
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
TechNow, Inc, San Antonio TX
07/06/2026 - 07/10/2026
08:00 -16:00
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
TechNow, Inc, San Antonio TX
10/19/2026 - 10/23/2026
08:00 -16:00
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
  • Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
  • Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
  • Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
  • Optimize OSPFv2 and OSPFv3 behavior
  • Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
  • Implement route redistribution using filtering mechanisms
  • Troubleshoot redistribution
  • Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
  • Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
  • Optimize MP-BGP in IPv4 and IPv6 environments
  • Troubleshoot MP-BGP for IPv4 and IPv6
  • Describe the features of Multiprotocol Label Switching (MPLS)
  • Describe the major architectural components of an MPLS VPN
  • Identify the routing and packet forwarding functionalities for MPLS VPNs
  • Explain how packets are forwarded in an MPLS VPN environment
  • Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
  • Implement Dynamic Host Configuration Protocol (DHCP)
  • Describe the tools available to secure the IPV6 first hop
  • Troubleshoot Cisco router security features
  • Troubleshoot infrastructure security and services

Prerequisites:

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

In this course, you will gain the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security Appliance.

Attendees to N-455: Securing Networks with ASA Fundamentals (SNAF) will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introducing Cisco Security Appliance Technology and Features
  • Cisco Adaptive Security Appliance and PIX Security Appliance Families
  • Getting Started with Cisco Security Appliances
  • Essential Security Appliance Configuration
  • Configuring Translations and Connection Limits
  • Using ACLS and Content Filtering
  • Configuring Object Grouping
  • Switching and Routing on Security Appliances
  • Configuring AAA for Cut-Through Proxy
  • Configuring the Cisco Modular Policy Framework
  • Configuring Advanced Protocol Handling
  • Configuring Threat Detection
  • Configuring Site-to-Site VPNS Using PreShared Keys
  • Configuring Security Appliance Remote Access VPNs
  • Configuring Cisco Security Appliance for SSL VPN
  • Configuring Transparent Firewalls Mode
  • Configuring Security Contexts
  • Configuring Failover
  • Managing Security Appliances

Prerequisites:

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 


Course Overview:

This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.

Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.

This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

You will learn how to protect, detect and respond to, and predict threats on the network.  This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.

You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.

This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

 

What’s Included:

  • EC-Council official E-Courseware
  • EC-Council iLabs access included for 6 months
  • EC-Council official Certificate of Attendance
  • CND Exam Voucher with 1 FREE RETAKE VOUCHER

 

Security Course Flow
Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
02/02/2026 - 02/06/2026
08:00 -16:00
TN-545: Certified Network Defender
TechNow, Inc, San Antonio TX
04/27/2026 - 05/01/2026
08:00 -16:00
TN-545: Certified Network Defender
TechNow, Inc, San Antonio TX
07/20/2026 - 07/24/2026
08:00 -16:00
TN-545: Certified Network Defender
TechNow, Inc, San Antonio TX
10/26/2026 - 10/30/2026
08:00 -16:00
TN-545: Certified Network Defender
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Content:

  • Module 01. Network and Defense Strategies
  • Module 02. Administrative Network Security
  • Module 03. Technical Network Security
  • Module 04. Network Perimeter Security
  • Module 05. Endpoint Security-Windows Systems
  • Module 06. Endpoint Security- Linux Systems
  • Module 07. Endpoint Security- Mobile Devices
  • Module 08. Endpoint Security- IoT Devices
  • Module 09. Administrative Application Security
  • Module 10. Data Security
  • Module 11. Enterprise Virtual Network Security
  • Module 12. Enterprise Cloud Network Security
  • Module 13. Enterprise Wireless Network Security
  • Module 14. Network Traffic Monitoring and Analysis
  • Module 15. Network Logs Monitoring and Analysis
  • Module 16. Incident Response and Forensic Investigation
  • Module 17. Business Continuity and Disaster Recovery
  • Module 18. Risk Anticipation with Risk Management
  • Module 19. Threat Assessment with Attack Surface Analysis
  • Module 20. Threat Prediction with Cyber Threat Intelligence

 

Prerequisites:

  • Basic network and host operations knowledge
  • Experience commensurate with one to five years of network, host, or application administration
  • TN-325:Security+   or equivalent

 

Courses to follow:

 

Target Audience:

Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations

 

About us:

TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.

Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Packages and namespaces
  • References and scoping
  • Manipulating complex data structures
  • Object-oriented programming
  • Writing and using modules
  • Testing PERL code
  • Contributing to CPAN

Prerequisites:

 

Comments

Latest comments from students


User: J Masters

Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.


 

Liked the class?  Then let everyone know!