TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:

    in   

    Course Overview:

    In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.

    Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Planning Routing Services to Requirements
    • Implementing an EIGRP-Based Solution
    • Implementing a Scalable Multiarea Network
    • OSPF-Based Solution
    • Implement an IPv4- Based Redistribution Solution
    • Implementing Path Control Connection of an Enterprise Network to an ISP Network

    Prerequisites:

    • None

     

    Comments

    Latest comments from students


    User: jrtrussell

    Instructor comments: Awesome

    Facilities comments: Awesome


    Liked the class?  Then let everyone know!

    Course Overview:

    This course provides security professionals with the skills and knowledge to perform vulnerability and compliance scanning of supported operating systems, devices, and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits, and compliance benchmarks, and discuss the underlying technologies utilized by the Nessus scanner.

    This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Introduction to Nessus and Vulnerability Scanning
    • Nessus Installation and Administration
    • Basic Nessus Scan Operation
    • Nessus Scan Configuration and Policy Creation
    • Vulnerability Analysis and Reporting with Nessus
    • Advanced Scan Configuration and Policy Creation
    • Introduction to Compliance and Auditing
    • Nessus Auditing Features
    • Windows System Auditing
    • Unix System Auditing
    • Cisco IOS Auditing
    • Nessus Database Auditing
    • Nessus Content Auditing
    • Auditing to Industry Guidelines
    • Auditing to Federal Guidelines

    Prerequisites:

    Students should possess a basic understanding of TCP/IP networking, operating systems security, and common client/server applications.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.

    Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Toolkit and Lab Assembly
    • Malware Code and Behavioral Analysis Fundamentals
    • Malicious Static and Dynamic Code Analysis
    • Collecting/Probing System and Network Activities
    • Analysis of Malicious Document Files
    • Analyzing Protected Executables
    • Analyzing Web-Based Malware
    • DLL Construction and API Hooking
    • Common Windows Malware Characteristics in x86 Assembly
    • Unpacking Protected Malware
    • In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
    • In-Depth Analysis of Malicious Executables
    • Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis

    Prerequisites:

    • Strong understanding of core systems and network concepts
    • Exposure to programming and assembly concepts
    • Comfortable with command line access

    Comments

    Latest comments from students



    User: marcus.osullivan

    Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.

    Facilities comments: The baby deer were neat! I like the resort.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).

    Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.

    Date/Location:

    No Events

    Duration: 5 days

    Course Objectives:

    • Designing a Logical Architecture
    • Planning Service Application Architecture
    • Planning for Performance and Capacity
    • Designing a Physical Architecture
    • Designing a Security Plan
    • Planning Authentication
    • Planning Managed Metadata
    • Planning Social Computing
    • Designing Enterprise Search Strategy
    • Planning Enterprise Content Management
    • Developing a Plan for Governance
    • Designing a Maintenance and Monitoring Plan

    Prerequisites:

    • At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
    • At least one year’s experience of mapping business requirements to logical and physical technical design
    • Working knowledge of network design, including network security

    Comments

    Latest comments from students


     

    Liked the class?  Then let others know!