TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.
Course Overview:
In this course, the students will design various data platform technologies into solutions that are in line with business and technical requirements. This can include on-premises, cloud, and hybrid data scenarios which incorporate relational, NoSQL, or Data Warehouse data. They will also learn how to design process architectures using a range of technologies for both streaming and batch data. The students will also explore how to design data security, including data access, data policies, and standards. They will also design Azure data solutions, which includes the optimization, availability, and disaster recovery of big data, batch processing, and streaming data solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to DP-201: Designing an Azure Data Solution will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 3 days
Course Outline:
- Data Platform Architecture Considerations
- Azure Batch Processing Reference Architectures
- Azure Real-Time Reference Architectures
- Data Platform Security Design Considerations
- Designing for Resiliency and Scale
- Design for Efficiency and Operations
Prerequisites :
-
-
- In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses:
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-204:Developing Solutions for Microsoft Azure will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Outline:
- Creating Azure App Service Web Apps
- Implement Azure functions
- Develop solutions that use blob storage
- Develop solutions that use Cosmos DB storage
- Implement laaS solutions
- Implement user authentication and authorization
- Implement secure cloud solutions
- Implement API Management
- Develop App Service Logic Apps
- Develop event-based solutions
- Develop message-based solutions
- Monitor and optimize Azure solutions
- Integrate caching and content delivery within solutions
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Students should have 1-2 years professional development experience and experience with Microsoft Azure.
- Student must be able to program in an Azure Supported Language.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to maintaining a database.
Attendees to MS-6231: Maintaining a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Installing and Configuring SQL Server
- Managing Databases and Files
- Disaster Recovery
- Managing Security
- Transferring Data
- Automating Administrative Tasks
- Implementation Replication
- Maintaining High Availability
- Monitoring SQL Server
- Troubleshooting and Performance Tuning
Prerequisites:
Comments
Latest comments from students
User: angelangeles
Instructor comments: Clay was knowledgeable instructor with enough experience to make subject matter relatable to real world usage.
Liked the class? Then let everyone know!
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.