(ISC)², CBK, and CISSP are registered marks of the International Information Systems Security Certification Consortium in the United States and other countries.
Access, Excel, Hyper-V, Outlook, Microsoft, SharePoint, Silverlight, SQL Server, Visual Basic, Win32, Windows, Windows PowerShell and Windows Server are registered trademarks of Microsoft Corporation.
Adobe, Acrobat, Flash and Photoshop are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries
Amazon Web Services is a trademark of Amazon.com, Inc.
Android is a trademark of Google Inc.
APMG-International Change Management, The APMG-International Change Management and Swirl Device logo, APMG-International AgilePM and The APMG-International AgilePM and Swirl Device logo are trademarks of The APM Group Limited.
Certified Ethical Hacker (CEH) is a registered trademark of EC-Council.
Cisco is a registered trademark of Cisco Systems Inc.
CMMI® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
CAPM, Certified Associate in Project Management (CAPM), PMP, Project Management Professional (PMP), PMI-ACP, PMI Agile Certified Practitioner (PMI-ACP), PMBOK, and the R.E.P. Logo are marks of Project Management Institute, Inc.
CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
Certified Business Analysis Professional, Certification of Competency in Business Analysis, Endorsed Education Provider, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
COBIT is a trademark of ISACA, registered in the U.S. and other countries.
COBIT® 5 is a trademark of the Information Systems Audit and Control Association® (ISACA®). This product includes COBIT® 5, used by permission of ISACA®. 2012© ISACA®. All rights reserved.
CompTIA A+ and CompTIA Network+ are registered trademarks of the Computing Technology Industry Association, Inc.
CompTIA CASP and CompTIA Cloud Essentials are trademarks of the Computing Technology Industry Association, Inc.
GIAC and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
Hadoop is a registered trademark of the Apache Software Foundation.
Hibernate is a registered trademark and servicemark of Red Hat, Inc.
iPad, iPhone, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
ITIL®, PRINCE2® and MSP® are registered trademarks of AXELOS Limited.
JavaScript, JavaServer, JavaServer Pages, Enterprise JavaBeans, MySQL and PL/SQL are trademarks of Oracle Corporation.
Linux is a registered trademark of Linus Torvalds.
Java and Oracle are registered trademarks of Oracle Corporation.
Palo Alto Networks, PAN-OS, App-ID, Content-ID, Url-ID, GlobalProtect, Wildfire, and Panorama are trademarks of Palo Alto Networks, Inc.
"Python" is a registered trademark of the Python Software Foundation, used by Learning Tree International with permission from the Foundation.
Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries.
Red Hat Middleware, LLC. All rights reserved.
SANS and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
SAP Crystal Reports is the registered trademark of SAP AG in Germany and in several other countries.
Scrum Alliance REPSM is a service mark of Scrum Alliance, Inc. Any unauthorized use is strictly prohibited.
TechNow® is a registered trademark of TechNow Incorporated.
The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved.
The Swirl logo™ is a trademark of AXELOS Limited.
Transact-SQL is a trademark of Sybase, Inc.
UNIX is a registered trademark of The Open Group.
VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
XML is a trademark of MIT, INRIA or Keio on behalf of the World Wide Web Consortium.
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).
Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/16/2026 - 03/20/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
|
07/06/2026 - 07/10/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
- Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
- Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
- Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
- Optimize OSPFv2 and OSPFv3 behavior
- Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
- Implement route redistribution using filtering mechanisms
- Troubleshoot redistribution
- Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
- Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
- Optimize MP-BGP in IPv4 and IPv6 environments
- Troubleshoot MP-BGP for IPv4 and IPv6
- Describe the features of Multiprotocol Label Switching (MPLS)
- Describe the major architectural components of an MPLS VPN
- Identify the routing and packet forwarding functionalities for MPLS VPNs
- Explain how packets are forwarded in an MPLS VPN environment
- Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
- Implement Dynamic Host Configuration Protocol (DHCP)
- Describe the tools available to secure the IPV6 first hop
- Troubleshoot Cisco router security features
- Troubleshoot infrastructure security and services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of network fundamentals
- Basic knowledge of how to implement LANs
- General understanding of how to manage network devices
- General understanding of how to secure network devices
- Basic knowledge of network automation
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI. This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .
TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams. Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI. As with many advanced TechNow security courses, there is a large hands-on ratio. This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries. CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.
This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. . MDT puts us close the mission and helps define the internal context to be analyzed against the CTI. TechNow pushes the student to truly understand how to think about and use CTI to make a difference.
Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Learn to comprehend and develop complex scenarios
- Identify and create intelligence requirements through practices such as threat modeling
- Utilize threat modeling to drive intelligence handling and practices
- Breakdown tactical, operational, and strategic-level threat intelligence
- Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
- How to collect adversary information creating better value CTI
- How to filter and qualify external sources, mitigating low integrity intelligence
- Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
- Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
- Breaking down threats mapped against their tradecraft to tweak IOCs
- Establish structured analytical techniques to be successful in any security role
- Learn and apply structured principles in support of CTI and how to communicate that to any security role.
Course Prerequisites:
- Security+, or equivalent experience
Comments
Latest comments from students
