The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must.  TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development. 

Here is a list of all of our Microsoft courses:

    in   

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.

    Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Accessing the Network
    • Advanced Fuzzing Techniques
    • Advanced Stack Smashing
    • Attacking the Windows Domain – Enumeration
    • Attacking the Windows Domain – Restricted Desktops
    • Attacking the Windows Domain – The Attacks
    • Building a Metasploit Module
    • Crypto for Penetration Testers
    • Exploiting the Network
    • Fuzzing Introduction and Operation
    • Introduction to Memory and Dynamic Linux Memory
    • Introduction to Windows Exploitation
    • Manipulating the Network
    • Python and Scapy For Penetration Testers
    • Shellcode
    • Smashing the Stack
    • Windows Heap Overflow Introduction
    • Windows Overflows

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: ryanv

    Instructor comments: Great.

    Facilities comments: N/A. Hotel.


    User: sean.hollinger

    Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow.

    Facilities comments: adequate


    Liked the class?  Then let everyone know!

    Course Overview:

    In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.

    Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Planning Routing Services to Requirements
    • Implementing an EIGRP-Based Solution
    • Implementing a Scalable Multiarea Network
    • OSPF-Based Solution
    • Implement an IPv4- Based Redistribution Solution
    • Implementing Path Control Connection of an Enterprise Network to an ISP Network

    Prerequisites:

    • None

     

    Comments

    Latest comments from students


    User: jrtrussell

    Instructor comments: Awesome

    Facilities comments: Awesome


    Liked the class?  Then let everyone know!

    Course Overview:

    This course provides security professionals with the skills and knowledge to perform vulnerability and compliance scanning of supported operating systems, devices, and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits, and compliance benchmarks, and discuss the underlying technologies utilized by the Nessus scanner.

    This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Introduction to Nessus and Vulnerability Scanning
    • Nessus Installation and Administration
    • Basic Nessus Scan Operation
    • Nessus Scan Configuration and Policy Creation
    • Vulnerability Analysis and Reporting with Nessus
    • Advanced Scan Configuration and Policy Creation
    • Introduction to Compliance and Auditing
    • Nessus Auditing Features
    • Windows System Auditing
    • Unix System Auditing
    • Cisco IOS Auditing
    • Nessus Database Auditing
    • Nessus Content Auditing
    • Auditing to Industry Guidelines
    • Auditing to Federal Guidelines

    Prerequisites:

    Students should possess a basic understanding of TCP/IP networking, operating systems security, and common client/server applications.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!