TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

Here are courses about specilaized Software or Hardware:

    in   

    Course Overview:

    This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.

    Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Information Security and Open Source Software
    • Operating System Tools
    • Firewalls
    • Scanners
    • Vulnerability Scanners
    • Network Sniffers
    • Intrusion Detection Systems
    • Analysis and Management Tools
    • Encryption Tools
    • Wireless Tools
    • Forensic Tools
    • More on Open Source Software

    Prerequisites:

    • Experience in IT Security
    • Solid basic knowledge of networks and TCP/IP
    • Experience in command line under Linux and Windows is required

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    DoD 8570 Training

    The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

    DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

    Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

    Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


     

     

      For further information or to schedule for classes, call us at 800-324-2294

       

      in   
       

      Course Overview:

      Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

      What’s Included:

      • Authorized courseware
      • Exam voucher
      • IAPP membership

      **GDPR Regulation Mandated May 25, 2018**

      Course Objectives:

      Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
      The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.

      Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

      TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

      TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

       

      Document Flow Chart iconsm

      Dates/Locations:

      No Events

      Duration: 2 Days

      Course Content:

      • Module 1: Data Protection Laws
      • Module 2: Personal Data
      • Module 3: Controllers and Processors
      • Module 4: Processing Personal Data
      • Module 5: Information Provision
      • Module 6: Data Subjects’ Rights
      • Module 7: Security of Processing
      • Module 8: Accountability
      • Module 9: International Data Transfers
      • Module 10: Supervisions and Enforcement
      • Module 11: Compliance.

       

      Prerequisites: None

      Target Audience:

      Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data

      Comments

      Latest comments from students


      Liked the class?  Then let everyone know!

      Course Overview:

      A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

      What’s Included:

        • EC-Council official E-Courseware
        • EC-Council official Certificate of Attendance
        • EC-Council iLabs with access for 6 months
        • EC-Council CPENT Range access
        • CEH Exam Voucher

         

        Dates/Locations:

        No Events

        Duration: 5 days

        Course Content:

          • Module 01. Introduction to Penetration Testing
          • Module 02. Penetration Testing Scoping and Engagement
          • Module 03. Open Source Intelligence (OSINT)
          • Module 04. Social Engineering Penetration Testing
          • Module 05. Network Penetration Testing – External
          • Module 06. Network Penetration Testing – Internal
          • Module 07. Network Penetration Testing – Perimeter Devices
          • Module 08. Web Application Penetration Testing
          • Module 09. Wireless Penetration Testing
          • Module 10. IoT Penetration Testing
          • Module 11. OT/SCADA Penetration Testing
          • Module 12. Cloud Penetration Testing
          • Module 13. Binary Analysis and Exploitation
          • Module 14. Report Writing and Post Testing Actions

         

        Prerequisites:

            • Pass the CEH exam
            • Pass the CND exam

        Target Audience:

        Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

         

        Comments

        Latest comments from students


         

        Liked the class?  Then let everyone know!