Course Overview:
TechNow’s Course ensures that you are ready to test for the CCNA Certification. This intensive ten-day program is a high end, hands-on, bootcamp using physical routers & switches in classroom. Students will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. Additionally the course stress tests the students on exam practices that insure the student a successful outcome on the 200-301 CCNA exam.
This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability.
Attendees to N-310: CCNA Extended Bootcamp will receive TechNow approved course materials and expert instruction.
Date/Locations:
This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability. (210) 733-1093
Duration: 10 days
Course Objectives:
-
- Identify the components of a computer network and describe their basic characteristics
- Understand the model of host-to-host communication
- Describe the features and functions of the Cisco Internetwork Operating Systems (IOS) software
- Describe LANs and the role of switches within LANs
- Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
- Install a switch and perform the initial configuration
- Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
- Describe the TCP/IP Transport layer and Application layer
- Explore functions of routing
- Implement basic configuration on a Cisco router
- Explain host-to-host communications across switches and routers
- Identify and resolve common switched network issues and common problems associated with IPv4 addressing
- Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
- Describe the operation, benefits, and limitations of static routing
- Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
- Describe the application and configuration of inter-VLAN routing
- Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
- Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
- Configure link aggregation using EtherChannel
- Describe the purpose of Layer 3 redundancy protocols
- Describe basic WAN and VPN concepts
- Describe the operation of Access Control Lists (ACLs) and their applications in the network
- Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
- Describe basic Quality of Service (QoS) concept
- Describe network and device architectures and introduce virtualization
- Introduce the concept of network programmability and Software-Defined Networking (SDN)
- Configure basic IOS system monitoring tools
- Describe the management of Cisco devices
- Describe the current security threat landscape
- Describe threat defense technologies
- Implement a basic security configuration of the device management plane
- Implement basic steps to harden network devices
Lab Objectives:
-
-
- Get started with Cisco Command-Line Interface (CLI)
- Observe How a Switch Operates
- Perform Basic Switch Configuration
- Implement the Initial Switch Configuration
- Inspect TCP/IP Applications
- Configure an Interface on a Cisco Router
- Configure and Verify Layer 2 Discovery Protocols
- Implement an Initial Router Configuration
- Configure Default Gateway
- Explore Packet Forwarding
- Troubleshoot switch Media and Port Issues
- Troubleshoot Port Duplex Issues
- Configure Basic IPv6 Connectivity
- Configure and Verify IPv4 Static Routes
- Configure Iv6 Static Routes
- Implement IPv4 Static Routing
- Implement IPv6 Static Routing
- Configure VLAN and Trunk
- Troubleshoot VLANs and Trunk
- Configure a Router on a Stick
- Implement Multiple VLANs and Basic Routing Between the VLANs
- Configure and Verify Single-Area OSPF
- Configure and Verify EtherChannel
- Improve Redundant Switched Topologies with EtherChannel
- Configure and Verify IPv4 ACLs
- Implement Numbered and Named IPv4 ACLs
- Configure a Provider-Assigned IPv4 Address
- Configure Static NAT
- Configure Dynamic NAT and Port Address Translation (PAT)
- Implement PAT
- Log into the WLC
- Monitor the WLC
- Configure a Dynamic (VLAN) Interface
- Configure a DHCP Scope
- Configure a WLAN
- Define a Remote Access Dial-In User Service (RADIUS) Server
- Explore Management Options
- Explore the Cisco DNA Center
- Configure and Verify NTP
- Configure System Message Logging
- Create the Cisco IOS Image Backup
- Upgrade Cisco IOS Image
- Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
- Secure Console and Remote Access
- Enable and Limit Remote Access Connectivity
- Secure Device Administrative Access
- Configure and Verify Port Security
- Implement Device Hardening
Prerequisites:
-
-
- Familiarity in the following networking topics:
- TCP/IP
- IP Configuration
- Peer-to-Peer Networking
- Subnetting
- Building a Routing Table
- It is not required but highly recommended to have the following certifications:
Comments
Latest comments from students
User: kdinivahi29
Instructor comments: The instructor Mr. Tom Bigger has done a terrific job of substantiating the textbook content with hands on labs. He has been patient and ensure that we understood the material
User: MikeWisn
Instructor comments: Did exceptional job explaining complicated concepts.
Facilities comments: Hotel front desk phone ringing loudly during class was distracting.
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- Images and Metadata
- Justniffer
- SQL Injection
- Antivirus and IDS evasion
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course explores the VMware Infrastructure, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments. Extensive hands-on labs provide for a rich student experience.
Attendees to VM-315: VMware Infrastructure: Install, Configure, and Manage will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Virtual Infrastructure Overview
- ESX and ESXi Server Installation
- Configuration of Networking, Scalability and Security
- Storage
- Install and Configure vCenter Server and Components
- Creation, Deployment, Management, and Migration of Virtual Machines
- Utilize vCenter Server for Resource Management
- Utilize vCenter Server for Virtual Machine Access Control and User Managment
- Use vCenter Server to increase scalability
- Monitoring Your Environment
- Data & Availability Protection Troubleshooting
-
Use VMware vCenter Update Manager to apply ESXi patches
-
Use vCenter Server to manage vMotion, HA, DRS and data protection.
Prerequisites:
- To ensure your success, system administration experience on Microsoft or Linux operating systems is required.
Comments
Latest comments from students
User: wolfdenise
Instructor comments: The instructor was nice and kept us entertained while providing instruction.
Facilities comments: The facility was nice, clean and easy to get to.
User: asteeves@aol.com
Instructor comments: knowledgeable but can get off subject at times
Facilities comments: good
Like the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.