Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Course one of a three course series to obtain a Server 2016 MCSA certification. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
The course leads directly to preparing for the(MCSA):Windows Server 2016 exam “70-740: Installation, Storage, and Compute with Windows Server 2016”. It also maps to Microsoft’s course 20740A, and is part of the Server 2016 MCSA certification.
Attendees to TN-5415: Installation, Storage, and Compute with Window Server 2016 will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!
Increase your credibility, job security, and career opportunities by reaching your goal and getting certified! TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class. We have a proven testing program that will get you the results you want!
TechNow has been involved in enterprise security architectures and education since 1990. TechNow’s training program has followed the evolution of enterprise computing into security architectures. Palo Alto Networks represents the current state of security product evolution. With next generation firewall technology, the reunification of your security architecture is possible. TechNow can present the ramifications of many centralized strategies. All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
Palo Alto Networks Certifications: Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take EDU-201 + EDU-205 + EDU-221
TechNow is a mobile Pearson VUE Authorized Testing Center. Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course. Take the course and get certfied, without logistical effort of getting students to a training facility and the hassle of scheduling testing.
TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
Course Overview:
This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).
Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.
Date/Location:
No Events
Duration: 5 days
Course Objectives:
- Designing a Logical Architecture
- Planning Service Application Architecture
- Planning for Performance and Capacity
- Designing a Physical Architecture
- Designing a Security Plan
- Planning Authentication
- Planning Managed Metadata
- Planning Social Computing
- Designing Enterprise Search Strategy
- Planning Enterprise Content Management
- Developing a Plan for Governance
- Designing a Maintenance and Monitoring Plan
Prerequisites:
- At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
- At least one year’s experience of mapping business requirements to logical and physical technical design
- Working knowledge of network design, including network security
Comments
Latest comments from students
Liked the class? Then let others know!