Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
TechNow, Inc., a training company, was founded in 1990. TechNow celebrated 29 years of regularly scheduled commercial training delivery in 2019 and has evolved into a global training company that is dynamic and able to customize our training to meet the needs of our customers. Our focus is hands-on, skills-based hardware/software and security training for those who want stay current with today's ever-changing technologies. We are a Pearson Vue Testing Center and have developed a proven testing program, including mobile testing, that ends with certification at the end of many of our courses. Our courses are taught by professional educators and experts in their respective fields and bring to the classroom a wealth of knowledge from the "real world". Our customers include many Fortune 500 companies as well as the Department of Defense, Federal Government, and Intelligence Agencies.
At TechNow our goal is to help you achieve your goals and we strive for 100% customer service and satisfaction. TechNow's certification pass rate is the highest in the industry. Our web-site and our professional training advisors will assist you with selecting courses that help meet your organization's objectives and the right career path to stay competitive in today's market.
To learn more about TechNow or to schedule your training, call us at 800-324-2294.
Course Overview:
This course is designed for students who intend to work with virtual private networks (VPNs) using IPSec. The course includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. This class is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients.
Attendees to N-315: Cisco Secure Virtual Private Networks will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
- Network Security & Virtual Private Network Technologies Cisco VPN 3000 Concentrator Series Hardware Overview
- Routing on the VPN 3000
- Configuring the Cisco VPN 3000 for Remote Access Using Pre-shared Keys
- Configuring the Cisco VPN 3000 for Remote Access Using Digital Certificates
- The Cisco VPN Client Firewall Feature
- Configuring the Cisco 3002 Hardware Client for Remote Access
- Configuring the Cisco 3002 Hardware Client for User & Unit Authentication
- Configuring Cisco VPN Clients for Backup Server, Load Balancing & Reverse Route Injection
- Configuring the Cisco 3000 Concentrator for IPSec over TCP & UDP
- Configuring LAN-to-LAN VPNs on the Cisco 3000
- Network Monitoring & Administration Troubleshooting
Prerequisites:
- Students who attend this advanced course must have experience in configuring Cisco IOS software
- CCNA certification
- Basic knowledge of the Windows operations system
- Familiarity with the networking & security terms & concepts
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
No Events
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
-
-
- 2+ years of proven information security work experience
- Educational background with digital security specialization
Target Audience:
-
- Law Enforcement
- Defense & Military
- E-Business Security
- Systems Administrators
- Legal Professionals
- Banking & Insurance professionals
- Government Agencies
- IT Managers
-
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The HCISPP is the only certification that combines cybersecurity skills with privacy best practices and techniques. It demonstrates you have the knowledge and ability to implement, manage, and assess security and privacy controls to protect healthcare organizations using policies and procedures established by the cybersecurity experts at (ISC)2. TechNows HCISPP Certification Boot Camp is a comprehensive review of Healthcare cybersecurity with privacy best practices & industry best practices.
Attendees to TN-8155: HCISPP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction..
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Strategically focus your preparation for HCISPP Certification
- Cover a broad spectrum of topics in the 7 domains of the HCISPP Common Body of Knowledge (CBK)
- Gain knowledge on the Healthcare industry including third party relationships and health data management concepts
- Identify applicable regulations, compliance frameworks, privacy principles and policies to protect information security
- Develop risk management methodology and identify control assessment procedures
Audience:
- The HCISPP certification is ideal for security professionals responsible for safeguarding protected health information (PHI). Take this HCISPP training course to prepare to manage and implement security controls for healthcare information. HCISPPs are instrumental to a variety of job functions: Compliance Officer, Information Security Manager, Privacy Officer, Compliance Auditor, Risk Analyst, Medical Records Supervisor, IT Manager, Privacy & Security Consultants, and Health Information Manager.
Comments
Latest comments from students