After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

    Course Overview:

    The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

    This course is designed to assist in your exam preparation for the CISM exam.

    Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    11/17/2025 - 11/21/2025
    08:00 -16:00
    TN-825: Certified Information Security Manager (CISM) Seminar
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Information Security Governance (24%)
    • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
    • Information Risk Management (30%)
    • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
    • Information Security Program Development and Management (27%)
    • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
    • Information Security Incident Management (19%)
    • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

    Prerequisites:

    A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

    Comments

    Latest comments from students


    User: tracycampbell

    Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

    Facilities comments: The Home2Suites by Hilton was FANTASTIC!



    Liked the class?  Then let everyone know!

    Course Overview:

    In this course, students learn the IPv6 protocols & processes & describe how IPv6 is supported in the latest versions of Microsoft Windows operating system.  Students will also learn how to describe transition technologies that allow you to deploy IPv6 in IPv4 intranets & across the IPv4 Internet.

    Attendees to TN-395: Internet Protocol Version 6 (IPv6) will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Learn how to create IPv6 networks with Cisco Systems products
    • Supplement your IPv6 course with a self-study guide based on the course materials
    • Understand practical applications of IPv6 through a solutions-oriented writing approach
    • Increase comprehension & retention through chapter tools like objectives, summaries, scenarios & review questions
    • Features & benefits of IPv6
    • IPv6 in the Windows Server2003 Family
    • IPv6 addressing & the IPv6 header
    • Internet Control Message Protocol for IPv6 (ICMPv6)
    • Neighbor & multicast listener discovery
    • Address auto configuration
    • IPv6 name resolution & routing
    • Coexistence & migration
    • IPv6 mobility

    Prerequisites:

    • Students should have a working knowledge of a Windows OR Unix Operating system. 
    • In addition, the student should also have basic end-user skills in TCP/IP.

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    In this course students will learn to install the Linux™ operating system, to administer users and software, to use vi, basic Linux security, process control, file system maintenance, backup and recovery, including some basic networking concepts. This course insures that students have the skills to configure all desktop and client side related activity.

    Attendees to L-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Linux operating system installation
    • Hardware Issues
    • LILO & GRUB Configuration
    • Managing the Linux file system
    • Boot Process
    • Customization of setup files
    • System Startup
    • Run Levels
    • Network Services
    • User Management
    • Changing Passwords
    • Monitoring, accessing & restricting root system access
    • Administration Tools
    • Disk Management
    • Quotas
    • Process Control
    • Installing & removing software & patches
    • Network Configuration
    • Client side components of NFS, Samba, NTP, NIS
    • Printing
    • Backup and Recovery
    • Using utilities for process control, locating files & automating maintenance tasks

    Prerequisites:

    • Students should have an understanding of all basic UNIX commands as well as variable substitution, wild card expansion, command pipes, permissions, the grep  and find commands.
    • These prerequisites can be met through completion of TN-125: Introduction to UNIX & Linux and six month’s experience with Linux.

     

    Comments

    Latest comments from students


    User: flores2015

    Instructor comments: Very Good Instructor (Bill Peterson)

    Facilities comments: Nice - Can't wait for your new facility.



    Liked the class?  Then let everyone know!

    Course Overview:

    The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it.  The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession.  With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.  CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.  This course will help the student prepare to obtain this credential.

    Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Information Systems Auditing Process (18%)
      • Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
    • Governance & Management of IT (18%)
      • This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
    • Information Systems Acquisition, Development & Implementation  (12%)
      • Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
    • Information Systems Operation & Business Resilience (26%)
      • Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.s.
    • Protection of Information Assets  (26%)
      • Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

    Prerequisites:

    A minimum of five years of professional information systems auditing, control & security work experienced is required.  Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.

    Comments

    Latest comments from students


    User: fsarisen

    Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


    User: storoy30

    Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


    Liked the class?  Then let everyone Know!