Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
Here are the security courses specific to TechNow:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- N-595: VoIP Security Analysis and Design
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-8155: HCISPP Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Updates Seminar
Course Overview
Sharepoint is becoming an institution in the modern office. Collaboration, file sharing, and even internal social sites are all available in SharePoint 2010/2013. Take advantage of all that Sharepoint has to offer. Learn to install, configure and administer SharePoint 2010/2013, by taking this 5 day course.
Attendees to MS-10174: Configuring and Administering SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.
Dates/Locations
Duration: 5 Days
Course Objectives:
- Prepare and Install SharePoint 2010/2013
- Configure the Fundamental Services and Logical Components
- Administer SharePoint Using Command Line, User Interface and Powershell
- Manage Content in Lists and Libraries
- Install, Configure, and Operate a SharePoint Farm
Prerequisites
- Students should be experienced Windows 2003 or Windows 2008 server administrators
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.
Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Manage Identity
- Plan Desktop and Device Deployment
- Plan and Implement a Microsoft 365 Solution
- Configure Networking
- Configure Storage
- Manage Data Access and Protection
- Manage Remote Access
- Manage Apps
- Manage Updates and Recovery
Comments
Latest comments from students
Liked the class? Then let everyone know!