Twenty years of experience in the area of information assurance ensures that you are benefiting from a very mature and successful security training program.  TechNow offers the full suite of security training courses to meet any DoD 8570 requirements.

Security Course Flow

Unix Course Flow

Here is our list of security related courses.

    in   

    Course Overview:

    This course will provide students with proficiency in the everyday management of Linux based clients and basic management of server system. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux based clients, server systems and security.  Let us help you prepare for the CompTIA Linux+ exam (XK0-005).

    TechNow is a CompTIA partner and uses official CompTIA Linux+ curriculum.

    Attendees to CT-245: Linux+ will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Perform basic Linux tasks
    • Manage users and groups
    • Manage permissions and ownership
    • Manage storage
    • Manage files and directories
    • Manage kernel modules
    • Manage the Linux boot process
    • Manage system components
    • Manage devices
    • Manage networking
    • Manage packages and software
    • Secure Linux systems
    • Write and execute Bash shell scripts
    • Automate tasks
    • Plan and perform a Linux installation

    Prerequisites:

     

    Comments

    Latest comments from students


    User: cwbrind

    Instructor comments: Great experience with Mr. Peterson, would recommend again. Highly knowledgable and approachable for any subject.

    Facilities comments: The Holiday Inn was a nice location for learning despite traffic around the area.



    Liked the class?  Then let everyone know!

    Over twenty years experience in the area of Solaris, Linux, and Unix ensures that you are benefiting from a very mature and successful Solaris, Linux, and Unix training program.  TechNow offers the full suite of Solaris, Linux, and Unix courses utilizing real hardware.  This is not virtualized Solaris on Intel processors, or remote connection to a distant system.  The student learns to deal with real hardware taking advantage of Sparc T series processors. Solaris 10 and Solaris 11 is taught hands-on with data center skills as the focus.  We also offer Solaris 10 migration courses to Solaris 10 or Solaris 11.

    The following is a list of our Unix/Linux training courses:

      in   

      Course Overview:

      This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

      Duration: 5 Days

      Audience:

      Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

      Course Prerequisites:

      We recommend that attendees of this course have the following prerequisite:
      • Network+

      Dates/Locations:

      No Events

      Course Outline:

      DAY ONE

      Course Set Up and Analyzer Testing

      Network Analysis Overview
      Wireshark Functionality Overview
      Capturing Wired and Wireless Traffic
      Define Global and Personal Preferences for Faster Analysis
      Defined Time Values and Interpret Summaries
      Interpret Basic Trace File Statistics to Identify Trends
      Create and Apply Display Filters for Efficient Analysis

      DAY TWO

      Follow Streams and Reassemble Data
      Use Wireshark’s Expert System to Identify Anomalies
      TCP/IP Analysis Overview
      Analyze Common TCP/IP Traffic Patterns

      DAY THREE

      Graph I/O Rates and TCP Trends
      802.11 (WLAN) Analysis Fundamentals
      Voice over IP (VoIP) Analysis Fundamentals
      Network Forensics Fundamentals

      DAY FOUR

      Detect Scanning and Discovery Processes
      Analyze Suspect Traffic

      DAY FIVE

      Use Command‐Line Tools

      Next/Related Courses: