Here are our Microsoft Programming courses:
Course Overview:
This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform. The course focuses on C# program structure, language syntax & implementation details. C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++. It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.
Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of the Microsoft .NET Platform Overview of C#
- Using Value-Type Variables
- Statements & Exceptions
- Methods & Parameters
- Arrays
- Essentials of Object-Oriented Programming
- Using Reference-Type Variables
- Creating & Destroying Objects
- Inheritance in C#
- Aggregation, Namespaces & Advanced Scope
- Operators & Events Properties & Indexes
- Attributes
Prerequisites:
- Experience with programming in C, C++, Visual Basic, Java or another programming language
Comments
Latest comments from students
User: jdmccol
Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.
Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.
Liked the class? Then let everyone know!
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment. Security teams wrestle with the impact and liability of Cloud computing on an organization. This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).
Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment. Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy. Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds. Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.
Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 3 days
Course Objectives:
- Cloud computing introduction
- Security challenges in the cloud
- Infrastructure security in the cloud
- Policy, risk, and governance for cloud computing
- Compliance and legal considerations
- Audit and assessment for the cloud
- Data security in the cloud
- Identity and Access Management (IAM)
- Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
- Intrusion detection and incident response
Course Prerequisites:
- GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
User: reedrobt
Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?
Facilities comments: Home2 location was well-kept and convenient to other services.