Course Overview:
This course explores the VMware Infrastructure, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments. Extensive hands-on labs provide for a rich student experience.
Attendees to VM-315: VMware Infrastructure: Install, Configure, and Manage will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Virtual Infrastructure Overview
- ESX and ESXi Server Installation
- Configuration of Networking, Scalability and Security
- Storage
- Install and Configure vCenter Server and Components
- Creation, Deployment, Management, and Migration of Virtual Machines
- Utilize vCenter Server for Resource Management
- Utilize vCenter Server for Virtual Machine Access Control and User Managment
- Use vCenter Server to increase scalability
- Monitoring Your Environment
- Data & Availability Protection Troubleshooting
-
Use VMware vCenter Update Manager to apply ESXi patches
-
Use vCenter Server to manage vMotion, HA, DRS and data protection.
Prerequisites:
- To ensure your success, system administration experience on Microsoft or Linux operating systems is required.
Comments
Latest comments from students
User: wolfdenise
Instructor comments: The instructor was nice and kept us entertained while providing instruction.
Facilities comments: The facility was nice, clean and easy to get to.
User: asteeves@aol.com
Instructor comments: knowledgeable but can get off subject at times
Facilities comments: good
Like the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
Course Overview:
CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions. Cloud Essentials is a vendor-neutral credential designed to validate the candidate has an understanding of basic terms and definitions of cloud computing along with the different processes involved in the successful adoption of cloud computing and its implications for organizations’ use.
TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ curriculum.
Attendees to CT-213: Cloud Essentials+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 3 days
Course Objectives:
- Domain 1 : Cloud Concepts
- Understand cloud principles
- Identify cloud networking concepts & storage techniques
- Understand cloud design aspects
- Domain 2: Business Principles of Cloud Environments
- Identify and employ appropriate cloud assessments like feasibility studies, benchmarking, or gap analysis
- Highlight key business aspects of cloud vendor relation adoption, and comprehend cloud migration approaches
- Domain 3: Management and Technical Operations
- Explain aspects of operating within the cloud, such as data management or optimization
- Understand the role of DevOps in cloud environments, like API integration or provisioning
- Domain 4: Governance, Risk, Compliance and Security for the Cloud
- Understand risk management and response concepts related to cloud services and identify the importance and impacts of compliance in the cloud, such as regulatory concerns or international standards.
Course Prerequisites:
- CompTIA recommends that a candidate have at least 6 months of experience in an IT environment, with direct involvement in IT-related tasks responsibilities and/or decision making.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!