Course Overview:

TN-575: Open Source Network Security Monitoring teaches students how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. No network is bullet proof and when attackers access your network, this course will show you how to build a security net to detect, contain, and control the attacker. Sensitive data can be monitored and deep packet and deep attachment analysis can be achieved. As organizations stand up a Security Operations Center (SOC) the enterprise NSM is the key ingredient to that SOC. This course not only teaches how to implement an NSM technologically, but how to effectively monitor an enterprise operationally. You will learn how to architect an NSM solution: where to deploy your NSM platforms and how to size them, stand-alone or distributed, and integration into packet analysis, interpret evidence, and integrate threat intelligence from external sources to identify sophisticated attackers. A properly implemented NSM is integral to incident response and provides the responders timely information to react to the incident. TN-575: Open Source Network Security Monitoring is a lab intensive environment with a cyber range that gives each student in-depth knowledge and practical experience monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls.

Attendees to TN-575: Open Source Network Security Monitoring class will receive TechNow approved course materials and expert instruction.

This Course is taught utilizing Security Onion or RockNSM as specified by the customer.

Dates/Locations:

No Events

Duration: 5 Days

Course Objective:

The focus of this course is to present a suite of Open Source security products integrated into a highly functional and scalable Network Security Monitoring solution.

Prerequisites:

Students should have a basic understanding of networks, TCP/IP and standard protocols such as DNS, HTTP, etc. Some Linux knowledge/experience is recommended, but not required

Course Outline:

  • Network Security Monitoring (NSM) Methodology
  • High Bandwidth Packet Capture Challenges
  • Installation of Security Onion
    • Use Cases (analysis, lab, stand-alone, distributed)
    • Resource Requirements
  • Configuration
    • Setup Phase I – Network Configuration
    • Setup Phase 2 – Service Configuration
    • Evaluation Mode vs. Configuration Mode
    • Verifying Services
  • Security Onion Architecture
    • Configuration Files and Folders
    • Network Interfaces
    • Docker Environment
    • Security Onion Containers
  • Overview of Security Onion Analyst Tools
    • Kibana
    • CapME
    • CyberChef
    • Squert
    • Sguil
    • NetworkMiner
  • Quick Review of Wireshark and Packet Analysis
    • Display and Capture Filters
    • Analyze and Statistics Menu Options
    • Analysis for Signatures
  • Analyzing Alerts
    • Replaying Traffic
    • 3 Primary Interfaces:
      • Squert
      • Sguil
      • Kibana
    • Pivoting Between Interfaces
    • Pivoting to Full Packet Capture
  • Snort and Surricata
    • Rule Syntax and Construction
    • Implementing Custom Rules
    • Implementing Whitelists and Blacklists
  • Hunting
    • Using Kibana to Slice and Dice Logs
    • Hunting Workflow with Kibana
  • Bro
    • Introduction and Overview
      • Architecture, Commands
    • Understanding and Examining Bro Logs
      • Using AWK, sort, uniq, and bro-cut
    • Working with traces/PCAPs
    • Bro Scripts Overview
      • Loading and Using Scripts
    • Bro Frameworks Overview
      • Bro File Analysis Framework FAF
    • Using Bro scripts to carve out more than files
  • RockNSM ( * If Applicable)
    •  Kafka
      • Installation and Configuration
      • Kafka Messaging
      • Brokers
      • Integration with Bro and FSF
    • File Scanning Framework FSF
      • Custom YARA Signatures
      • JSON Trees
      • Sub-Object Recursion
      • Bro and Suricata Integration
  • Elastic Stack
    • Adding new data sources in Logstash
    • Enriching data with Logstash
    • Automating with Elastalert
    • Building new Kibana dashboards
  • Production Deployment
    • Advanced Setup
    • Master vs Sensor
    • Node Types – Master, Forward, Heavy, Storage
    • Command Line Setup with sosetup.conf
    • Architectural Recommendations
    • Sensor Placement
    • Hardening
    • Administration
    • Maintenance
  • Tuning
    • Using PulledPork to Disable Rules
    • BPF’s to Filter Traffic
    • Spinning up Additional Snort / Suricata / Bro Workers to Handle Higher Traffic Loads

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-325: Security+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • VM-315: VMware Infrastructure: Install, Configure, and Manage
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-215: Cloud+
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • in   

    Course Overview:

    This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.

    Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Information Security and Open Source Software
    • Operating System Tools
    • Firewalls
    • Scanners
    • Vulnerability Scanners
    • Network Sniffers
    • Intrusion Detection Systems
    • Analysis and Management Tools
    • Encryption Tools
    • Wireless Tools
    • Forensic Tools
    • More on Open Source Software

    Prerequisites:

    • Experience in IT Security
    • Solid basic knowledge of networks and TCP/IP
    • Experience in command line under Linux and Windows is required

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview: 

    This hands-on, lab-driven course directs managers, project managers, and team leaders through the real-world process of using SharePoint to propel projects.  Improve efficiency and boost the likelihood of success as you learn to build a customized Project Management Information System (PMIS), develop SharePoint project sites, build document libraries and management protocols.  You will integrate Microsoft Office software, build SharePoint Workflows, archive completed projects, and much more during SharePoint project management training.  Add these critical SharePoint tools to your project management expertise and experience the drastic difference that comes with truly effective project management.

    Attendees to TN-323: SharePoint 2010/2013 for Project Management will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 3 days

    Course Objectives:

    • SharePoint as a Project Management Information System (PMIS)
    • Creating a PMIS
    • Enabling Team Collaboration with SharePoint
    • Tracking Projects with SharePoint
    • Working with Business Intelligence
    • Establishing Processes and Standards with SharePoint
    • Managing Meeting with Meeting Workspaces
    • Working with Microsoft Access
    • Creating a PMO View
    • Concluding a Project

    Prerequisites:

    Comments

    Latest comments from students


    User: joseibarra

    Instructor comments: Very patient, communicated expertly. Made the class easy to understand and how it applies in the real world.

    Facilities comments: Excellent.



    Liked the class?  Then let everyone know!

     

     

     

     

    Course Overview:

    Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.

    If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.

    This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.

    Dates/Locations:

    No Events

    Duration: 10 Days

    Course Content:

      • Module 01. Installing Windows
      • Module 02. Updating Windows
      • Module 03. Post-Installation Configuration and Personalization
      • Module 04. Configuring Peripherals and Drivers
      • Module 05. Configuring Networks
      • Module 06. Configuring Storage
      • Module 07. Managing Apps in Windows 10
      • Module 08. Configuring Authorization & Authentication
      • Module 09. Configuring Data Access and Usage
      • Module 10. Configuring Advanced Management Tools
      • Module 11. Supporting the Windows 10 Environment
      • Module 12. Troubleshooting the Windows OS
      • Module 13. Troubleshooting Files & Applications
      • Module 14. Troubleshooting Hardware and Drivers
      • Module 15. Planning an Operating System Deployment Strategy
      • Module 16. Implementing Windows 10
      • Module 17. Managing Updates for Windows 10
      • Module 18. Device Enrollment
      • Module 19. Configuring Profiles
      • Module 20. Application Management
      • Module 21. Managing Authentication in Azure AD
      • Module 22. Managing Devices and Device Policies
      • Module 23. Managing Security

     

    Prerequisites:

        • Microsoft 365 Certified Fundamentals (M-MS900)

    Target Audience:

    IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!