Course Overview:

This hands-on course provides a comprehensive introduction to programming logic, and builds a solid foundation of programming skills that can be used to master additional programming languages like C, C++, PERL, Java or Python. To learn programming you must focus on a particular language, and we have chosen Java.  In this course you will write and debug programs in Python. If you would like this course to use a different computer language, that can be arranged.

Attendees to PL-115: Fundamentals of Computer Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Writing Simple Programs Data Types, Constants, & Variables
  • Screen Output & Keyboard Input
  • Expressions
  • Decision Making
  • Looping
  • Subroutines
  • Debugging
  • Data Collections – Arrays
  • Data Collections – Classes Working with Files

Prerequisites:

  • This course is for students starting out in programming.  No programming experience is required.

 

Comments

Latest comments from students


User: tsonger

Instructor comments: While I could tell the instructor was very knowledgeable, his instructions were not very clear. He could've done a better job preparing for the class.

Facilities comments: Room was fine. The location of the room could have been better as the dings from the elevator were a bit distractive.


User: TracyPaul

Instructor comments: Very knowledgeable. Diagnosed our programming problems in short order. Could go into the details of 'why', versus only the 'how'.

Facilities comments: Outstanding. The hotel staff did a great job supporting our class.


 

Liked the class?  Then let everyone know!

TechNow offers the full gamut of programming languages from ANSI C and C++ to the various Microsoft .Net languages (Visual Basic, C# and C++).  If you are completely new to programming, TechNow offers courses that demonstrate the fundamentals to get you started.

If you prefer Unix/Linux, we offer Shell Programming, as well as, Perl and Python.  We also offer courses in the web development languages, such as, Java Servlets, JSP, and ASP .Net.

The following is a list of our Programming training courses:

    in   
     

    Course Overview:

    This course teaches students how to use the powerful PERL programming language, focusing on hands-on labs to promote retention & challenge students to apply their skills to new situations. PERL is a flexible, easy to use language suitable for many tasks such as system administration, web applications & database integration. System administrators, web programmers & database administrators will benefit from mastering this powerful programming language. This course reviews & builds on the information presented in PL-115: Fundamentals of Computer Programming.

    Attendees to P-245: Programming with PERL will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Introduction
    • Scalar Data
    • Lists & Arrays
    • Subroutines
    • Input & Output
    • Hashes
    • In the World of Regular Expressions
    • Matching with Regular Expressions
    • Processing Text with Regular Expressions
    • More Control Structures
    • File Tests
    • Directory Operations
    • Strings & Sorting
    • Process Management
    • PERL Modules
    • Some Advanced PERL Techniques

    Prerequisites:

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This course, TN-385: TCP/IP Analysis & Implementation, provides students with a comprehensive technical introduction to TCP/IP & the interworkings of TCP/IP application to UNIX, Linux and Windows in a network environment.  This course begins by providing a comprehensive protocol stack analysis.  It continues with extensive hands-on exercises needed to configure TCP/IP on UNIX and Windows based networks.

    Attendees to TN-385: TCP/IP Analysis & Implementation will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • A thorough comprehension of each level of the protocol stack
    • Configuring UNIX & Windows to access internetworks
    • Configuring & setting up a Cisco router
    • Properly implementing subnets to avoid ongoing maintenance headaches
    • Routing & routing protocols, RIP, OSPF, and IGRP
    • How to troubleshoot a wide range of routing problems
    • All major TCP/IP application services including: FTP, TELNET, SNMP, NFS, DNS, DHCP, & WINS
    • How to avoid common internetworking problems
    • How to troubleshoot TCP/IP networks using protocol analysis techniques – snoop on Sun Workstation & Network Monitor on Windows.
    • How to design, build, configure, & manage TCP/IP internetworks
    • Applying a structured methodology for troubleshooting TCP/IP internetworks
    • ACL's on Cisco routers

    Prerequisites:

    • Students should have good end-user skills in TCP/IP (FTP, TELNET, RLOGON,  & MAIL).

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

     

     

     

     

     

     

    Course Overview:

    The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

    The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

    What’s Included:

    • 5 days of instructor-led in classroom training
    • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
    • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
    • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
    • CHFI Courseware
    • Exam Voucher
    • CHFI onsite exam scheduling

    Course Objectives:

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
    • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
    • Identify & check the possible source/ incident origin
    • Recover deleted files and partitions in Windows, MAC OS X, and Linux
    • Conduct reverse engineering for known and suspected malware files
    • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

      • Module 01. Computer Forensics in Today’s World
      • Module 02. Computer Forensics Investigation Process
      • Module 03. Understanding Hard Disks and File Systems
      • Module 04. Data Acquisition and Duplication
      • Module 05. Defeating Anti-forensics Techniques
      • Module 06. Operating System Forensics (Windows, Mac, Linux)
      • Module 07. Network Forensics
      • Module 08. Investigating Web Attacks
      • Module 09. Database Forensics
      • Module 10. Cloud Forensics
      • Module 10. Malware Forensics
      • Module 11. Investigating Email Crimes
      • Module 12. Investigating Email Crimes
      • Module 13. Mobile Forensics
      • Module 14. Forensics Report Writing and Presentation

     

    Prerequisites:

        • 2+ years of proven information security work experience
        • Educational background with digital security specialization

      Target Audience:

        • Law Enforcement
        • Defense & Military
        • E-Business Security
        • Systems Administrators
        • Legal Professionals
        • Banking & Insurance professionals
        • Government Agencies
        • IT Managers

    • Comments

      Latest comments from students


      Liked the class?  Then let everyone know!