TechNow offers many courses that also have a related certification exam. As an Authorized Peason VUE testing center, we offer exams for many certifications. Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.
Course Overview:
This hands-on, lab-driven course directs managers, project managers, and team leaders through the real-world process of using SharePoint to propel projects. Improve efficiency and boost the likelihood of success as you learn to build a customized Project Management Information System (PMIS), develop SharePoint project sites, build document libraries and management protocols. You will integrate Microsoft Office software, build SharePoint Workflows, archive completed projects, and much more during SharePoint project management training. Add these critical SharePoint tools to your project management expertise and experience the drastic difference that comes with truly effective project management.
Attendees to TN-323: SharePoint 2010/2013 for Project Management will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 3 days
Course Objectives:
- SharePoint as a Project Management Information System (PMIS)
- Creating a PMIS
- Enabling Team Collaboration with SharePoint
- Tracking Projects with SharePoint
- Working with Business Intelligence
- Establishing Processes and Standards with SharePoint
- Managing Meeting with Meeting Workspaces
- Working with Microsoft Access
- Creating a PMO View
- Concluding a Project
Prerequisites:
- PM-223: Introduction to Project Management or equivalent knowledge
- Six months experience with SharePoint as an end-user
- Six months experience with SharePoint as an administrator
Comments
Latest comments from students
User: joseibarra
Instructor comments: Very patient, communicated expertly. Made the class easy to understand and how it applies in the real world.
Facilities comments: Excellent.
Liked the class? Then let everyone know!
Course Overview:
This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment. It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements. The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and 40% lab time.
Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Overview of Business Analysis Workshop
- Eliciting Project Workshop
- Case Study
- Analyzing Requirements and Writing Case Studies
- Case Study
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Linux System Administration II course is for experienced administrators ready for advanced administration topics. This course provides students with hands-on experience working with more complex and integrated administration concepts, and builds upon the Part 1 course. Students will be instructed in essential local Red Hat system administration skills including: Logical Volumes, Raid Management, and System Logging, SELinux and Virtual Machines. The Linux System Administration II course will get you started in understanding network administration topics, including monitoring, routing, Firewall with iptables, and servers such as NFS, SAMBA, DNS, SMTP, HTTP, DHCP, and Kickstart.
Attendees to RH-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
- Managing Logical Volumes and RAID
- Network Routing, Filtering and Monitoring
- Configuring File Sharing Across Platforms
- Configuring Internet Services
- Configuring Security
- Configuring System Messaging
- Using Name Services
- Configuring Name Service Clients
- Configuring Kickstart
- Virtualization with KVM
- Troubleshooting Boot Process
Prerequisites:
- RH-245: Linux System Administration I or equivalent knowledge plus six months experience as a system administrator or one year or more administrating the Red Hat operating system.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Accessing the Network
- Advanced Fuzzing Techniques
- Advanced Stack Smashing
- Attacking the Windows Domain – Enumeration
- Attacking the Windows Domain – Restricted Desktops
- Attacking the Windows Domain – The Attacks
- Building a Metasploit Module
- Crypto for Penetration Testers
- Exploiting the Network
- Fuzzing Introduction and Operation
- Introduction to Memory and Dynamic Linux Memory
- Introduction to Windows Exploitation
- Manipulating the Network
- Python and Scapy For Penetration Testers
- Shellcode
- Smashing the Stack
- Windows Heap Overflow Introduction
- Windows Overflows
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: ryanv Instructor comments: Great. Facilities comments: N/A. Hotel. User: sean.hollinger Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow. Facilities comments: adequate