DoD 8570 Training
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.

 
 
For further information or to schedule for classes, call us at 800-324-2294
 
			 
	 
	
 
	 
												
	
		DoD 8570 Training
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:

Note: The Certifications in red are recently added to approved list as of 2/4/19
For further information or to schedule for classes, call us at 800-324-2294
			 
	 
	
 
	 
												
	
		
 
Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.
TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.
Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.
 
Dates/Locations: 
Duration: 2 days
Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.
| Day 1
Module 0 – Introduction & OverviewMod 1: Overview
Panorama SolutionDeployment DesignMod 2: Initial Configuration
Interface ConfigurationSetup ConfigurationsDevice DeploymentConfiguration ManagementMod 3: Templates
Templates OverviewCommon OrganizationStrategiesConfiguring TemplatesMod 4: Device Groups
Device GroupsObjectsPoliciesDevice Group Commit   | Day 2
Mod 5: Administration
Admin Roles and AccessControlCommit ProcedureMod 6: Logging and
ReportingLoggingApplication CommandCenterApp-ScopeCorrelation ObjectsReportsMod 7: Log Collectors
Plan a Log CollectionDeploymentDistributed Data CollectionLog DeploymentConfigure Dedicated LogCollectorManaged Collector GroupsMod 8: Business Continuity
Panorama High AvailabilityCollector GroupRedundancyExport ConfigurationDisk Installation   | 
Prerequisites:
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class?  Then let everyone know!
			 
	 
	
 
	 
												
	
		
Course Overview: 
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
 
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
 
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
 
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
 
- Exploitation
- Using the Metasploit Framework and console to exploit
 
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
 
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
 
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
 
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
 
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
 
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites: 
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
User: dhonore
Instructor comments: Dave's presentation style is engaging and lively.
Facilities comments: The room was adequate for the needs of the class.
User: phouck
Instructor comments: David was very good. Although he went very fast at times. 
Facilities comments: The room was ok. it was bit dark.
Liked the class?  Then let everyone know!