Here are our Microsoft Programming courses:
Course Overview:
This course provides security professionals with the skills and knowledge to perform vulnerability and compliance scanning of supported operating systems, devices, and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits, and compliance benchmarks, and discuss the underlying technologies utilized by the Nessus scanner.
This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam.
Date/Locations:
Duration: 5 days
Course Objectives:
- Introduction to Nessus and Vulnerability Scanning
- Nessus Installation and Administration
- Basic Nessus Scan Operation
- Nessus Scan Configuration and Policy Creation
- Vulnerability Analysis and Reporting with Nessus
- Advanced Scan Configuration and Policy Creation
- Introduction to Compliance and Auditing
- Nessus Auditing Features
- Windows System Auditing
- Unix System Auditing
- Cisco IOS Auditing
- Nessus Database Auditing
- Nessus Content Auditing
- Auditing to Industry Guidelines
- Auditing to Federal Guidelines
Prerequisites:
Students should possess a basic understanding of TCP/IP networking, operating systems security, and common client/server applications.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!