Here are the Amazon Web Services (AWS) Security course offerings:
Course Overview:
This course will be fast paced with in-depth and live demonstrations.
Date/Locations:
Duration: 1 day
Course Objectives:
- UEFI, SecureBoot, TPM, and Enterprise BitLocker
- Windows VPN in the Enterprise
- Windows Advanced Firewall
- Utilizing Windows WMI
- Administering Windows with Powershell
- Using Autopsy for Forensics
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.
Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
01/26/2026 - 01/30/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
04/20/2026 - 04/24/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
07/13/2026 - 07/17/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Unix Overview
- Introduction to the UNIX command Line
- Managing and controlling access to files
- Batch Scripting and tools
- Regular Expressions, Pipelines, and IO Redirection
- Text File Manipulation
- Basic Network Commands
- Managing Unix Processes
- GNOME Graphical Desktop
Prerequisites:
- Basic Knowledge of Computers
Comments
Latest comments from students
User: trkdashin
Instructor comments: Very knowledgeable
Facilities comments: Nice Hotel
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.