- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Security Course Flow

Here is our list of security related courses.
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar
- CL-415: AWS System Operations
- CL-425: AWS Security Operations and Architecture
- CT-325: Security+
- CT-395: CySA+ Cybersecurity Analyst
- CT-405: PenTest+
- CT-425: CompTIA SecurityX
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- N-595: VoIP Security Analysis and Design
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
- PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance
- PP-244:CIPM + CIPP/E 4 Day GDPR Ready
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-385: TCP/IP Analysis & Implementation
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-525: Certified Penetration Testing Professional (CPENT)
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-555: Certified Ethical Hacker v13 (CEH)
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-715: Systems Security Certified Practitioner (SSCP)
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-812: Information Systems Security Engineering Professional (ISSEP)
- TN-813: Certified in Governance, Risk and Compliance (CGRC)
- TN-8150: CISSP Certification Preparation Seminar
- TN-8155: HCISPP Preparation Seminar
- TN-822: Certified Information Systems Auditor (CISA) Seminar
- TN-825: Certified Information Security Manager (CISM) Seminar
- TN-835: Certified in Risk and Information Systems Control (CRISC) Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-905: Cyber Threat Intelligence Analysis
- TN-909: Windows Forensic Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course
Course Overview:
The UNIX Security Administrator Prep is a hands-on course that covers how to secure and audit UNIX and Linux operating systems. This includes concepts such as Rootkits, Buffer overflows, and monitoring UNIX/Linux systems.
Attendees to TN-959: Unix Security Administratorwill receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- AIDE
- Apache
- Best Practices for Kernel Tuning and Warning Banners
- Boot Services
- Chroot()
- DNS- BIND
- DNSSec
- Evidence Collection and Preservation
- Forensic Analysis
- Forensic Preparation and Incident Handling
- Host Based Firewalls – iptables
- Intro to Forensics
- OS Install and Patching
- Physical, User Account, and Password Access Control
- Se Linux
- Sendmail
- SSH
- Stack Smashing
- Sudo
- Syslog-NG
- UNIX Logging
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: wbcarter
Instructor comments: Good Stuff. Thanks!
User: ryuhas
Instructor comments: Very Good Instructor
Facilities comments: Facilities was great. Location had a lot to be desired. To much traffic and accidents trying to get here.
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
PowerShell is made for Security Operations (SecOps) automation on Windows. SecOps requires automation in order to scale out security changes and monitoring beyond a handful of hosts. For example, when a vulnerability must be remediated but there is no patch for it yet, automation is needed to quickly and consistently enact the changes necessary. PowerShell “remoting” is encrypted remote command execution of PowerShell scripts in a way that can scale to thousands of endpoints and servers.
Imagine being able to hunt for indicators of compromise across thousands of machines with just a few lines of PowerShell code. Or imagine having the local Administrator account password reset every night on thousands of endpoints in a secure way, and being able to retrieve that password securely too.
We will show you to do these tasks and more. Transcription logging for forensics, strong encryption code signing, application whitelisting of scripts, IPSec port control, and Just Enough Admin (JEA).
As more and more of our systems are moved up to the cloud, PowerShell will become even more important. Amazon Web Services, Microsoft Azure, Office 365, Hyper-V and VMware already support PowerShell administration for many tasks.
Attendees to TN-963: Windows Security Automation with PowerShell will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 3 days
Course Objectives:
Day One
PowerShell Overview and Tips
-
- Getting started running commands
- Using and updating the built-in help
- Execution policies
- Fun tricks with the ISE graphical editor
- Piping .NET and COM objects, not text
- Using properties and methods of objects
- Helping Linux admins feel more at home
- Aliases, cmdlets, functions, modules, etc.
- Customizing your profile script
What Can We Do With PowerShell
-
- PowerShell remote command execution
- Fan-out remoting and security
- File copy via PowerShell remoting
- Capturing the output of commands
- Parsing text files and logs with regex patterns
- Searching remote event logs faster with XPath
- Mounting the registry as a drive
- Exporting data to CSV, HTML and JSON files
- Parsing and mining nmap port scanner XML output
- Running scripts as scheduled jobs
- Pushing out scripts through Group Policy
- Importing modules and dot-sourcing functions
- http://www.PowerShellGallery.com
Write your own scripts
-
- Writing your own functions
- Passing arguments into your scripts
- Function parameters and returning output
- Flow control: if-then, do-while, foreach, switch
- The .NET Framework class library: a playground
- How to pipe data in/out of your scripts
Day Two
Continuous Secure Configuration Enforcement
-
- How to use Group Policy and PowerShell together
- Automate with INF security templates
- How to customize INF templates
- Microsoft Security Compliance Manager (SCM)
- SECEDIT.EXE scripting
- Building an in-house security repository for SecOps/DevOps
- NSA’s Secure Host Baseline GPOs
Group Policy Precision Targeting
-
- Managing Group Policy Objects (GPOs) with PowerShell
- LSDOU, Block Inheritance, Enforced GPOs
- Group Policy permissions for targeting changes
- ADMX templates for mass registry editing
- Deploying PowerShell startup and logon scripts
- WMI item-level targeting of GPO preferences
- GPO scheduled tasks to run PowerShell scripts
- Remote command execution via GPO (not remoting)
- Empowering the Hunt Team to fight back!
Server Hardening for SecOps/DevOps
-
- Server Manager scripting with PowerShell
- Adding and removing roles and feature
- Remotely inventory roles, features, and apps
- Why Server Nano or Server Core
- Running PowerShell automatically after service failure
- Service account identities, passwords, and risks
- Tools to reset service account passwords securely
Day Three
PowerShell Desired State Configuration (DSC)
-
- DSC is Configuration Management built in for free
- Using DSC for continuous reinforcement of settings
- Writing your own DSC configuration scripts
- Free DSC resource modules: www.PowerShellGallery.com
- How to push DSC configurations to many targets
- DSC background job processing in push mode
- Examples: sync files, install roles, manage groups
- Auditing a remote target against a DSC MOF template
- “ApplyAndAutoCorrect” mode for continuous enforcement
PowerShell Just Enough Admin (JEA)
-
- JEA is Windows sudo, like on Linux
- JEA is Windows setuid root, like on Linux
- Restricting commands and arguments
- Verbose transcription logging
- How to set up and configure JEA
- Privilege Access Workstations (PAWs)
PowerShell and WMI
-
- Windows Management Instrumentation (WMI) service
- What is WMI and why do hackers abuse it so much?
- Using PowerShell to query WMI CIM classes
- WMI authentication and traffic encryption
- Inventory operating system versions and installed software
- WMI remote command execution versus PowerShell remoting
- PowerShell security best practices
- PowerShell transcription logging to catch hackers
Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students