TN-225: Network+ Skills Class is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client.
Attendees to the TN-225: Network+ Skills Class will receive TechNow approved course materials and expert instruction.
Please Note: This course is designed with a focus on skills and is not a preparation course for certification.
Instructor comments: He has an excellent way of explaining things on the level that anyone can understand easily. I wasn't looking forward to this class at all but I'm really glad I attended now. I have a much clearer understanding of networking fundamentals that I never would've received via CBTs.
I'd heard really good things about Tim Burkard's teaching skills and now I know they're true. I wouldn't mind taking other classes that he teaches,
Facilities comments: The facilities are really nice and there weren't any problems as far as I could tell. The hotel staff is very nice.
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:
Note: The Certifications in red are recently added to approved list as of 2/4/19
For further information or to schedule for classes, call us at 800-324-2294
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
Accessing the Network
Advanced Fuzzing Techniques
Advanced Stack Smashing
Attacking the Windows Domain – Enumeration
Attacking the Windows Domain – Restricted Desktops
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
Getting started running commands
Security cmdlets
Using and updating the built-in help
Execution policies
Fun tricks with the ISE graphical editor
Piping .NET and COM objects, not text
Using properties and methods of objects
Helping Linux admins feel more at home
Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
Customizing your profile script
PowerShell remote command execution
Security setting across the network
File copy via PowerShell remoting
Capturing the output of commands
Parsing text files and logs with regex patterns
Parsing Security Logs
Searching remote event logs
Mounting the registry as a drive
Security settings in the Registry
Exporting data to CSV, HTML and JSON files
Running scripts as scheduled jobs
Continued Security Compliance
Pushing out scripts through Group Policy
Importing modules and dot-sourcing functions
http://www.PowerShellGallery.com
PowerShell Scripting
PowerShell Scripting to implement Security Practices
Writing your own functions to automate security status and settings
Passing arguments into your scripts
Function parameters and returning output
Flow control: if-then, foreach, that make security decisions
How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]
The RHCSA Rapid Track Course is designed for experienced Linux® system administrators who want to expand their technical skill sets and become accredited with the Red Hat® Certified System Administration (RHCSA) certification. To successfully navigate this course, students should have experience with the Linux command line—including the necessary skills to execute common commands, such as cp, grep, sort, mkdir, tar, mkfs, ssh, and dnf—and be familiar with accessing man pages for help. At the completion of the course, students will be adequately prepared to take the RHCSA exam (EX200) .
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Introduce Linux and the Red Hat Enterprise Linux ecosystem.
Run commands and view shell environments.
Manage, organize, and secure files.
Manage users, groups and user security policies.
Control and monitor systemd services.
Configure remote access using the web console and SSH.
Configure network interfaces and settings.
Manage software using DNF
Access security files, file systems, and networks
Execute shell scripting and automation techniques
Manage storage devices, logical volumes, and file systems