Course Overview:
The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances, and maintaining an enterprise deployment of OpenStack. This course also teaches the management and customization of an enterprise deployment of OpenStack (overcloud) and how to manage compute nodes with Red Hat OpenStack Platform director (undercloud).
Attendees to CL-345: Red Hat OpenStack Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Prerequisites:
This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.
Prerequisites for this course is Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent experience.
Attend Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL115), or demonstrate equivalent experience
Course Outline:
- Navigate the Red Hat OpenStack Platform architecture
- Describe the OpenStack control plane
- Integrate Identity Management
- Perform image operations
- Manage storage
- Manage OpenStack networking
- Manage compute resources
- Automate could applications
- Troubleshoot OpenStack operations
- Comprehensive review
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The focus of Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL110) will be managing OpenStack using both the web-based dashboard and the command-line interface, in addition to managing instances and installing a proof-of-concept environment using Red Hat OpenStack Platform (RHOSP) director. Essential skills covered in the course include configuring Red Hat OpenStack Platform (using the director UI); managing users, projects, flavors, roles, images, networking, and block storage; setting quotas; and configuring images at instantiation.
Attendees to CL-115 Red Hat OpenStack Administration I: Core Operations for Cloud Operators will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Prerequisites:
This course is designed for Linux system administrators, cloud administrators, and cloud operators interested in, or responsible for, maintaining a private or hybrid cloud.
Prerequisites for this course is Red Hat Certified System Administrator (RHCSA) or demonstrate equivalent experience
Course Outline:
- Launch an instance
- Manage projects, quotas, and users
- Manage networks, subnets, routers, and floating IP adresses
- Create and manage block and object storage in the OpenStack framework
- Customize instances with cloud-init
- Deploy scalable stacks
- Deploy RedHat OpenStack Platform using RHOSP director
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the exam. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.
Attendees to TN-939: Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 9 days
Course Objectives:
- Backdoors & Trojan Horses
- Buffer Overflows
- Covering Tracks: Networks
- Covering Tracks: Systems
- Denial of Service Attacks
- Exploiting Systems Using Netcat
- Format String Attacks
- Incident Handling Overview and Preparation
- Incident Handling Phase 2: Identification
- Incident Handling Phase 3: Containment
- Incident Handling: Recovering and Improving Capabilities
- IP Address Spoofing
- Network Sniffing
- Password Attacks
- Reconnaissance
- Rootkits
- Scanning: Host Discovery
- Scanning: Network and Application Vulnerability scanning and tools
- Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
- Scanning: Service Discovery
- Session Hijacking, Tools and Defenses
- Types of Incidents
- Virtual Machine Attacks
- Web Application Attacks
- Worms, Bots & Bot-Nets
Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: m_jurrens
Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.
User: natebonds
Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.
Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.
Liked the class? Then let everyone know!
TechNow, Inc., a training company, was founded in 1990. TechNow celebrates 35 years of regularly scheduled commercial training delivery in 2025 and has evolved into a global training company that is dynamic and able to customize our training to meet the needs of our customers. Our focus is hands-on, skills-based hardware/software and security training for those who want stay current with today’s ever-changing technologies. We are a Pearson Vue Testing Center and have developed a proven testing program, including mobile testing, that ends with certification at the end of many of our courses. Our courses are taught by professional educators and experts in their respective fields and bring to the classroom a wealth of knowledge from the “real world”. Our customers include many Fortune 500 companies as well as the Department of Defense, Federal Government, and Intelligence Agencies.
At TechNow our goal is to help you achieve your goals and we strive for 100% customer service and satisfaction. TechNow‘s certification pass rate is the highest in the industry. Our web-site and our professional training advisors will assist you with selecting courses that help meet your organization’s objectives and the right career path to stay competitive in today’s market.
To learn more about TechNow or to schedule your training, call us at 800-324-2294.
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.