- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)

Course Overview:
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.
What’s Included:
- 5 days of instructor led in classroom training
- Labs
- PenTest+ Courseware
- Exam Voucher
- PenTest+ onsite exam scheduling
Course Objectives:
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conduct active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test application
- Complete post-exploit tasks
- Analyze and report pen test results
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Planning and Scoping Penetration Tests
- Module 02. Conducting Passive Reconnaissance
- Module 03. Performing Non-Technical Tests
- Module 04. Conducting Active Reconnaissance
- Module 05. Analyzing Vulnerabilities
- Module 06. Penetrating Networks
- Module 07. Exploiting Host-Based Vulnerabilities
- Module 08. Testing Applications
- Module 09. Completing Post-Exploit Tasks
- Module 10. Analyzing and Reporting Pen Test Results
Prerequisites:
-
-
- CT-225: Network+
- CT-325: Security+
- 3-4 years of hands-on information security or related experience
-
Target Audience:
This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
- Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
- Linux File, Directory, and Permissions Management
- Linux archives using tar and zip
- Interacting with BASH
- Review of Common Linux commands
- Sorting files by line or field
- Regular Expressions (meta character) with grep commands to locate specific lines in files
- Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
- Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
- Miscellaneous commands Tr, sort, cut, past, pr -Lab
- Performing non-interactive editing tasks with the sed command
- Writing simple sed scripts to perform complex editing tasks
- Using awk variables & arrays to sort data
- Employing awk programs to manipulate numeric & textual data
- Performing formatted printing in awk
- Writing simple awk programs to write reports from data files
- Using built-in awk functions & defining new functions
- Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
- Shell Review
- Shell Interpretation of Quotes & Backslash
- The Bash Shell
- Shell's combined with UNIX utilities
- Programming Basics
- Data Constructs
- Programming Looping
- Your Environment
- More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
- System Configuration / Kernel overview
- System Maintenance / Disk and file admin
- Using utilities for process control, locating files & automating maintenance tasks
- System Startup / Boot Process – LILO & GRUB Configuration
- Managing the Linux file system
- Customization of setup files
- Run Levels
- Network Services / Configuration
- User Management Monitoring, accessing & restricting root system access
- Administration Tools
- Process Control
- Client side components of NFS, Samba, NTP, NIS
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
- Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Facilities comments: Facility was fine
Liked the class? Then let everyone know!
Course Overview:
The introduction to SQL Databases training course is designed to train the learners on the fundamentals of database concepts. You will not only learn about the different types of databases, the languages and designs as well as describe important database concepts using SQL Server 2016. Anyone who is moving into a database role will benefit from taking this course.
Attendees to MS-5002: Introduction to SQL Databases will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 2 days
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
In this course, you will gain the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security Appliance.
Attendees to N-455: Securing Networks with ASA Fundamentals (SNAF) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introducing Cisco Security Appliance Technology and Features
- Cisco Adaptive Security Appliance and PIX Security Appliance Families
- Getting Started with Cisco Security Appliances
- Essential Security Appliance Configuration
- Configuring Translations and Connection Limits
- Using ACLS and Content Filtering
- Configuring Object Grouping
- Switching and Routing on Security Appliances
- Configuring AAA for Cut-Through Proxy
- Configuring the Cisco Modular Policy Framework
- Configuring Advanced Protocol Handling
- Configuring Threat Detection
- Configuring Site-to-Site VPNS Using PreShared Keys
- Configuring Security Appliance Remote Access VPNs
- Configuring Cisco Security Appliance for SSL VPN
- Configuring Transparent Firewalls Mode
- Configuring Security Contexts
- Configuring Failover
- Managing Security Appliances
Prerequisites:
Comments
Latest comments from students