- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
TechNow has been involved in enterprise client server architectures since 1990. TechNow has delivered national and international implementations for Valero, Wholefoods, Quest, USAA, Golfsmith, AMD, Motorola, and many other fortune 1000 corporations,
TechNow's training program has followed the evolution of enterprise computing into virtualization and cloud computing. With a focus on security, TechNow can present the ramifications of many centralized strategies. All courses utilize enterprise instructors with experience and can discuss the detail of implementation and the integration into an existing infrastructure.
Course Overview:
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies is the big picture overview of a SOC, other courses provide a deep dive into the technologies that a SOC may utilize. This course addresses the internal workings of staff, skills required, required authorizations, internal agreements, and setting appropriate expectation levels of a SOC within budget constraints. A SOC is not a one size fits all, the instructor has decades of security experience and brings to the table opportunities to discuss what can work within constraints. Many organizations are coming to the realization that some level of a SOC is now required and to learn just what decisions need to be made: Out-sourced, In-sourced, budgets, capabilities and many more. Students leave with a worksheet of how to progress when they get back to their organization.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies – Is a course that incorporates lecture, demos, and group exercises for standing up a Security Operations Center (SOC). Students learn strategies and resources required to deploy, build, and run Network Security Monitoring (NSM) and work roles and flows for a SOC. No network is bullet proof and when attackers access your network, this course will show you options and resources to build a security net to detect, contain, and control the attacker. Examples on what it takes to architect an NSM solution to identify sophisticated attackers and a response strategy. Properly implemented detection and response technologies is integral to incident response and provides the responders timely information and tools to react to the incident. Effective demonstrations are given of Open Source technologies that build up a SOC, but any software can be used and demonstrations are provided to demonstrate technology families not push a specific solution.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies demonstrations utilize a cyber range that gives each student in-depth knowledge of monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls; and software and services to provide orchestrate Incident Response, Intelligence Analysis, and Hunt Operations.
Attendees to TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objective:
-
- To provide management an overview of what it takes to stand up a SOC.
Prerequisites:
- Students should have an understanding of the security field.
Course Outline:
- What threats does my organization care about?
- What does a threat look like?
- What does a threat look like?
- How to present the SOC internally.
- Communication with Stakeholders and Executives Leveraging and integrating existing security measures
- People
- Establishing a skill matrix and work roles for SOC members
- Establishing a training path
- Personnel background requirementsProcesses
- Processes
- Alignment to standards: NIST, PCI, HIPAA, etc.
- Risk related decision trees
- Playbooks
- Threat Intelligence Integration
- Technology – Tool Suites to Support:
- Ethical Hacking
- Network Security Monitoring and SIEM
- Forensics
- Dashboards
- Analysis and Hunting
- Incident Management and Ticketing
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles. This leads to the processes of confirming the validity and usability for quality of the product development. An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.
Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objectives: At the conclusion of this course, students will be able to:
- Understand the Scrum Flow, the core components of the Scrum framework
- Understand the scope of the Product Owner role in detail
- Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
- Understand the scope of the Scrum Master role at a high level
- Understand the scope of the Scrum Development Team roles
- Document the interactions between the user of a system and the system itself
- Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format
Target Student:
- Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This is a hands-on course that covers many of the concepts of securing the perimeter of an organization. This includes concepts such as intrusion detection, packet filtering, and central logging.
A skills focus enables the student to better absorb the subject matter and perform better on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Firewalls.
This course is an excellent precursor to PA-215 Palo Alto Firewall Essentials FastTrack.
Attendees to TN-949: Certified Firewall Analyst Prep will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Analyzing Network and Wireless Design
- Creating and Auditing a Rulebase
- Firewall Assessment and Penetration Testing
- Host-Based Detection and DLP
- Incident Detection and Analysis
- IOS and Router Security
- IPv6 and ICMPv6
- Log Collection and Analysis
- NAT and Proxies
- Netfilter IPtables
- Network Access Control
- Network-Based Intrusion Detection
- Packet Filters and Inspection
- Packet Fragmentation
- Perimeter Concepts and IP Fundamentals
- Securing Hosts and Services
- TCP/IP Protocols
- VPN Design and Auditing
- VPN Implementation
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students