DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:

Note: The Certifications in red are recently added to approved list as of 2/4/19

    For further information or to schedule for classes, call us at 800-324-2294

    in   
      

     

    Course Overview: PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Class is a three-day course that teaches students to configure and manage the entire line of Palo Alto Networks next-generation firewalls. This course prepares the student for the Palo Alto Networks Accredited Configuration Engineer (ACE) and progress to the Palo Alto Networks Certified Network Security Engineer (PCNSE).  Through hands-on training, students learn high end skills of how to integrate Palo Alto next-generation firewalls into their network infrastructure.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

    This course sets up the foundation for the two day course PA-212: Palo Alto Networks Firewall Configure Extended Features. The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Course will receive TechNow approved course materials and expert instruction.

    TechNow PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205) immediately follows this course in the schedule so that you can take both courses in the same week.  We also offer a discount for attending both classes in the same week!!

    Dates/Locations:

    No Events

    Duration: 3 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS).

    Day 1

    • Module 0 – Introduction & Overview
    • Module 1 – Platforms and Architecture
      • Single-Pass Architecture
      • Flow Logic
    • Module 2 – Initial Configuration
      • Initial Access to the System
      • Configuration Management
      • Licensing and Software Updates
      • Account Administration
    • Mod 3: Basic Interface Configuration
      • Security Zones
        Layer 2, Layer 3, Virtual Wire, and Tap
      • Subinterfaces
      • DHCP
      • Virtual Routers
    • Mod 4: Security and NAT Policies
      • Security Policy Configuration
      • Policy Administration
      • NAT (source and destination)

    Day 2

    • Mod 5: Basic App-ID™
      • App-ID Overview
      • Application Groups and Filters
    • Mod 6: Basic Content-ID™
      • Antivirus
      • Anti-spyware
      • Vulnerability
      • URL Filtering
    • Mod 7: File Blocking and WildFire™
      • File Blocking
      • WildFire
    • Mod 8: Decryption
      • Certificate Management
      • Outbound SSL Decryption
      • Inbound SSL Decryption

         

         

    Day 3

    • Mod 9: Basic User-ID™
      • Enumerating Users
      • Mapping Users to IP Addresses
      • User-ID Agent
    • Mod 10: Site-to-Site VPNs
      • IPSec Tunnels
    • Mod 11: Management and Reporting
      • Dashboard
      • Basic Logging
      • Basic Reports
      • Panorama
    • Mod 12: Active/Passive High
      • Availability
      • Configuring Active/Passive HA

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!

    Course Overview:

    CT-205: A+ Certification Course provides students with the skills, knowledge and understanding that will enable them to install, configure, upgrade, troubleshoot and repair personal computer systems.  The A+ curriculum is excellent preparation for almost any computer related career or position.  This course lays the foundation for further study in networking and programming.  Designed for the new computer professional who has support knowledge of PC hardware, but needs to expand upon that knowledge.

    Attendees to CT-205: A+ Certification Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Identifying, Adding & Removing System Components
    • Installation, Configuring & System Optimization
    • Diagnosing & Troubleshooting Problems
    • Power Protection & Safety Procedures
    • Motherboards, Processors & Memory
    • Printers
    • Basic Networking
    • Operating System Fundamentals
    • Installation, Configuration & Upgrade
    • Diagnosing & Troubleshooting
    • Networks

    Prerequisites:

    • None

    Comments

    Latest comments from students


    User: whiggins29

    Instructor comments: Very knowledgeable, very engaging.


    User: jstuke12

    Instructor comments: Instructor was wonderful, Tim explained all questions fully and was a pleasure to learn from.

    Facilities comments: Facilities were outstanding.


    Like the class?  Then let everyone know!

    Course Overview:

    A skills focus enables the student to better absorb the subject matter and perform successfully on the job.  This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations.  PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC).  The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.

    Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Active Directory and BloodHound
    • Security Controls
    • PKI
    • Encryption
    • Wireless & Network Security and Hardening DNS
    • 802.1x and Endpoint Protection
    • Firewalls and VPN
    • PowerShell Scripting
    • JEA, DSC, Enterprise Security with PowerShell
    • Windows Attack Strategies

    Prerequisites:

    • Security+
    • Windows System Administration Skills

     

    Comments

    Latest comments from students


    User: bbrabender

    Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.

    Facilities comments: N/A


    User: dale.r.anderson

    Instructor comments: Instructor was well knowlegeable accross alot of domains.

    Facilities comments: Pretty good


    Liked the class?  Then let everyone know!

    Course Overview:

    This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.

    This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

    This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam  from EC-Council.

    This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

    What’s Included:

    • EC-Council official E-Courseware
    • EC-Council official iLabs code with access for 6 months
    • EC-Council official Certificate of Attendance
    • CEH Exam Voucher

     

    Security Course Flow
    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

    • Module 01. Introduction to Ethical Hacking
    • Module 02. Foot-printing and Reconnaissance
    • Module 03. Scanning Networks
    • Module 04. Enumeration
    • Module 05. Vulnerable Analysis
    • Module 06. System Hacking
    • Module 07. Malware Threats
    • Module 08. Sniffing
    • Module 09. Social Engineering
    • Module 10. Denial-of-Service
    • Module 11. Session Hijacking
    • Module 12. Evading IDS,Firewalls, and Honeypots
    • Module 13. Hacking Web Servers
    • Module 14. Hacking Web Applications
    • Module 15. SQL Injection
    • Module 16. Hacking Wireless Networks
    • Module 17. Hacking Mobile Platforms
    • Module 18. IoT and OT Hacking
    • Module 19. Cloud Computing
    • Module 20. Cryptography

     

    Prerequisites:

    • Windows operating system and/or Linux operating system or other Unix-based OS
    • TCP/IP protocols and implementation
    • At least 2 years of IT security experience
    • TN-325:Security+

    Target Audience:

    Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure

     

    About us:

    TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

    Tech Now, Inc. is an accredited Training Center with Ec-Council.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!