Course Overview
Sharepoint is becoming an institution in the modern office. Collaboration, file sharing, and even internal social sites are all available in SharePoint 2010/2013. Take advantage of all that Sharepoint has to offer. Learn to install, configure and administer SharePoint 2010/2013, by taking this 5 day course.
Attendees to MS-10174: Configuring and Administering SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.
Dates/Locations
No Events
Duration: 5 Days
Course Objectives:
- Prepare and Install SharePoint 2010/2013
- Configure the Fundamental Services and Logical Components
- Administer SharePoint Using Command Line, User Interface and Powershell
- Manage Content in Lists and Libraries
- Install, Configure, and Operate a SharePoint Farm
Prerequisites
- Students should be experienced Windows 2003 or Windows 2008 server administrators
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
Course Overview:
In this course, the students will design various data platform technologies into solutions that are in line with business and technical requirements. This can include on-premises, cloud, and hybrid data scenarios which incorporate relational, NoSQL, or Data Warehouse data. They will also learn how to design process architectures using a range of technologies for both streaming and batch data. The students will also explore how to design data security, including data access, data policies, and standards. They will also design Azure data solutions, which includes the optimization, availability, and disaster recovery of big data, batch processing, and streaming data solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to DP-201: Designing an Azure Data Solution will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 3 days
Course Outline:
- Data Platform Architecture Considerations
- Azure Batch Processing Reference Architectures
- Azure Real-Time Reference Architectures
- Data Platform Security Design Considerations
- Designing for Resiliency and Scale
- Design for Efficiency and Operations
Prerequisites :
-
-
- In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses:
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
We are often asked what is the recommended sequence of classes. Here is our recommended sequence of classes for The Security Field.
Certified Information Security Manager (CISM)
Certified Information Systems Auditor(CISA)
Certified Information Systems Security Professional(CISSP)