This course provides security professionals with the skills and knowledge to perform vulnerability and compliance scanning of supported operating systems, devices, and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits, and compliance benchmarks, and discuss the underlying technologies utilized by the Nessus scanner.
This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Introduction to Nessus and Vulnerability Scanning
Nessus Installation and Administration
Basic Nessus Scan Operation
Nessus Scan Configuration and Policy Creation
Vulnerability Analysis and Reporting with Nessus
Advanced Scan Configuration and Policy Creation
Introduction to Compliance and Auditing
Nessus Auditing Features
Windows System Auditing
Unix System Auditing
Cisco IOS Auditing
Nessus Database Auditing
Nessus Content Auditing
Auditing to Industry Guidelines
Auditing to Federal Guidelines
Prerequisites:
Students should possess a basic understanding of TCP/IP networking, operating systems security, and common client/server applications.
This FastTrack course combines combines two VMware courses (VMware Cloud Essentials and vCloud Architecting the VMware Cloud) into a single week course that adds extra exercises and labs to exemplify the techniques presented. The course begins with how to adopt, operate, and govern the cloud. The course enables participants to successfully complete the associated CompTIA Cloud Essentials™ Exam to become a Cloud Essentials™ Professional(CEP). This course also covers the subject matter specified by the VCP-Cloud certification.
This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud environment. Detailed labs and exercises for VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. A comprehensive VMware cloud design is demonstrated and discussed.
Attendees to VM-335: VMware Cloud Essentials and vCloud – Architecting the VMware Cloud FastTrack will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
Understand the common terms and definitions of cloud computing.
Understand the business benefits and business considerations of cloud computing.
Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
Understand the impact and changes of cloud computing on IT service management.
Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
Design a network infrastructure optimized for vCloud.
Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security rolesnderstand the common terms and definitions of cloud computing.
Understand the business benefits and business considerations of cloud computing.
Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
Understand the impact and changes of cloud computing on IT service management.
Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources.
Design a network infrastructure optimized for vCloud.
Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles.
This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.
NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment
Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 3 days
Course Outline:
Cloud Concepts
Core Azure Services
Security, Privacy, Compliance, And Trust
Azure Pricing and Support
Lab Objectives:
Create a virtual machine
Deploy Azure container instances
Create a virtual network
Create blob storage
Create a SQL database
Implement an Azure IoT Hub
Implement Azure Functions
Create a web app
Create a VM with a Template
Create a VM with PowerShell
Create a VM with CLI
Secure network traffic
Implement Azure key vault
Create an Azure Policy
Manage access with RBAC
Manage resource locks
Implement resource tagging
Exploring the Trust Center
Use the Azure Pricing Calculator
Use the Azure TCO Calculator
Open a Support request
Calculate composite SLAs
Access Azure Preview features
Prerequisites :
There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
This course is suitable for IT personnel who are just beginning to work with Azure.
This course primarily uses the Azure portal to create services and does not require scripting skills.
Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
This course provides an Azure pass and optional lab environment.
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
VoIP Architecture
VoIP Signaling and media protocols
Common VoIP authentication mechanisms
Common VoIP encryption techniques
VoIP protocol analysis with Wireshark
Maintaining QoS while mitigating DoS
VoXML, XML, and application integration security
Converged network security design and implementation
Impact of NAT and firewalls
SIP, H.323, and MGCP vulnerabilities
VPN, IPsec and SRTP to secure VoIP services
Penetration testing with open source tools
Attacks for Eavesdropping, call redirection, and DoS
Design of hacked firmware virtualization layer
Concise lockdown steps for network hardware and VoIP
Prerequisites:
This is an advanced Information Security Course which requires basic Windows & UNIX competency
Certification or 2 years of experience in these operating systems is highly recommended
AWS System Operations begins with a one day introduction to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.
The AWS course continues to flow with teaching those in a Systems Administrator or Developer Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
To continue to learn more about AWS, TechNow has the following course:
Attendees to CL-415: AWS System Operations will receive TechNow approved course materials and expert instruction.
Duration: 5 Days
Audience:
This course is intended for:
• System Administrators
• Software Developers, especially those in a Developer Operations (DevOps) role
DoD 8140: Not Mandated
Course Prerequisites:
We recommend that attendees of this course have the following prerequisites:
• Background in either software development or systems administration
• Some experience with maintaining operating systems at the command line (shell scripting in Linux environments, cmd or PowerShell in Windows)
• Basic knowledge of networking protocols (TCP/IP, HTTP)
Course Objectives:
This course is designed to teach you how to:
• Understand basic data center design concepts.
• Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console.
• Understand the foundational infrastructure services, including Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Amazon Elastic Block Store (EBS), Amazon Simple Storage Service (S3), Auto Scaling, and Elastic Load Balancing (ELB).
• Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM).
• Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS).
• Understand AWS management tools, including Amazon CloudWatch and AWS Trusted Advisor.
• Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
• Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
• Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
• Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
• Monitor the health of Amazon EC2 instances and other AWS services
• Manage user identity, AWS permissions, and security in the cloud
• Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
• Select and implement the best strategy for creating reusable Amazon EC2 instances
• Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
• Edit and troubleshoot a basic AWS CloudFormation stack definition
Dates/Locations:
No Events
Course Outline:
Day 1
• Introduction and History of AWS
• AWS Infrastructure: Compute, Storage, and Networking
• AWS Security, Identity, and Access Management
• AWS Databases
• AWS Management Tools
Day 2
• System Operations on AWS Overview
• Networking in the Cloud
• Computing in the Cloud Day 3
• Storage and Archiving in the Cloud
• Monitoring in the Cloud
• Managing Resource Consumption in the Cloud Day 4
• Configuration Management in the Cloud
• Creating Scalable Deployments in the Cloud
• Creating Automated and Repeatable Deployments Day 5 Full Day Lab
• Select the appropriate AWS service based on compute, data, or security requirements
• Execute steps required to provision cloud resources for selected deployment
• Identify and implement data protection, encryption, and capacity planning
• Implement and manage security policies, access controls, and role
• Implement Automation