Course Overview:
In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.
Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Planning Routing Services to Requirements
- Implementing an EIGRP-Based Solution
- Implementing a Scalable Multiarea Network
- OSPF-Based Solution
- Implement an IPv4- Based Redistribution Solution
- Implementing Path Control Connection of an Enterprise Network to an ISP Network
Prerequisites:
Comments
Latest comments from students
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Awesome
Liked the class? Then let everyone know!
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
TechNow offers training vouchers that are not locked into any particular course or student and are good for a full year from the date of purchase. Choose from any course we have to offer! Lock in your training budget today with TechNow Training Vouchers!
Call 800-324-2294 or use this handy link for more information.