TechNow Provides Integrated Solutions

TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security.  If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.

TechNow Virtualization Solutions:  TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware.  TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks.  High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure.  If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.

TechNow VoIP Solutions:   TechNow  delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks.  There are many marketing terms for highly integrated solutions, the term our product is "Great".  If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.

TechNow Security Solutions:   TechNow delivers security solutions that are enterprise centric.  As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement  hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.

in   

 

Course Overview: 

This course details how a well-educated Product Owner and a knowledgeable Scrum Master can work together to deliver a successful product with Agile principles using SCRUM approach.  Designed specifically for students who want to learn the mechanics of an Agile / Scrum team being led by a Product Owner and a Scrum Master.

This course offers a firm grasp of Agile principles as they relate to new product development.  If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course covers the Agile adaptive life cycle framework and everything in between.

Attendees to PM-232: Product Owner and Scrum Master Roles in AGILE using SCRUM will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Understand the Scrum Flow, the core components of the Scrum framework
  • Understand the principles of empirical process control
  • Understand the scope of the Product Owner role in detail
  • Understand the scope of the Scrum Master role at a high level
  • Understand the scope of the Scrum team roles and why there is no project manager
  • Understand how the Scrum Master measures team velocity
  • Understand the importance of having the product vision as an overarching goal galvanizing the entire Scrum team
  • Understand the relationship between the vision and the product roadmap
  • Understand the different estimation levels in Scrum
  • Understand what the Product Backlog is and what it is not
  • Understand Product Backlog grooming
  • Understand that Scrum planning is adaptive, iterative, incremental, and collaborative

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.

Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.

Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.

Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

• Virtual Infrastructure Overview
• ESX and ESXi Server Installation
• Configuration of Networking, Scalability and Security
• Storage
• Install and Configure vCenter Server and Components
• Creation, Deployment, Management, and Migration of Virtual Machines
• Utilize vCenter Server for Resource Management
• Utilize vCenter Server for Virtual Machine Access Control and User Managment
• Use vCenter Server to increase scalability
• Monitoring Your Environment
• Data & Availability Protection Troubleshooting
• Use VMware vCenter Update Manager to apply ESXi patches
• Use vCenter Server to manage vMotion, HA, DRS and data protection.

 

Course Overview:

This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to maintaining a database.

Attendees to MS-6231: Maintaining a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Installing and Configuring SQL Server
  • Managing Databases and Files
  • Disaster Recovery
  • Managing Security
  • Transferring Data
  • Automating Administrative Tasks
  • Implementation Replication
  • Maintaining High Availability
  • Monitoring SQL Server
  • Troubleshooting and Performance Tuning

Prerequisites:

  • None

Comments

Latest comments from students


User: angelangeles

Instructor comments: Clay was knowledgeable instructor with enough experience to make subject matter relatable to real world usage.



 

Liked the class?  Then let everyone know!

 

Course Overview:

 

This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations.  We have a suite of courses and certifications that help  understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.

The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.

This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python.  The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.

This course utilizes the “Violent Python” text book.

Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 3 Days

Course Objectives:

  • Python Lanuage Refress
  • Network Sockets
  • Exception Handling
  • Hashes and Cracking Passwords
  • Threading
    • Concepts and Python Implementation
    • Queues and Synchronization
    • urlparse and httplib to probe URLs
    • Crack a password protected zip file
  • Port Scanner
    • Threading a Port Scanner
  • nmap integration
  • Deploying shellcode
  • Mechanize, BeautifulSoup
    • HTTP Form Password Guessing
    • HTTP Proxies (Burp Suite)
    • HTTP Cookies Session Hijacking
      • CookieMonster
  • Images and Metadata
  • Justniffer
  • SQL Injection
    • sqlmap
    • SQLBrute
  • Antivirus and IDS evasion
    • PyInstaller
    • Metasploit
  • Scapy
    • Deploy shellcode
    • DNS Cache Poisoning
    • Packety Violence

Prerequisites:

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!