Here are the CompTIA Security course offerings:
Course Overview:
This course gives students the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues. This course includes material contained in Microsoft’s 6424, 6425, 6426 and is an aid to preparation for the 70-640 exam.
Attendees to TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Installation
- Administration
- Users
- Groups
- Computers
- Group Policy Infrastructure
- Group Policy Settings
- Domains and Forests
Prerequisites:
- Basic understanding of networking
- Intermediate understanding of network operating system
- An awareness of security best practices
- Basic knowledge of server hardware
- A+ or equivalent knowledge
- Some experience creating objects in Active Directory
- Basic concepts of backup and recovery in a Windows Server Environment
Comments
Latest comments from students
Liked the Class? Then let everyone know!
Course Overview:
This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.
Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.
Date/Locations:
Date/Time | Event |
---|---|
01/27/2025 - 01/31/2025 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
05/05/2025 - 05/09/2025 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
11/03/2025 - 11/07/2025 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Unix Overview
- Introduction to the UNIX command Line
- Managing and controlling access to files
- Batch Scripting and tools
- Regular Expressions, Pipelines, and IO Redirection
- Text File Manipulation
- Basic Network Commands
- Managing Unix Processes
- GNOME Graphical Desktop
Prerequisites:
- Basic Knowledge of Computers
Comments
Latest comments from students
User: trkdashin
Instructor comments: Very knowledgeable
Facilities comments: Nice Hotel
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.