Here are the General Unix course offerings:
Course Overview:
In this course, you will gain the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security Appliance.
Attendees to N-455: Securing Networks with ASA Fundamentals (SNAF) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introducing Cisco Security Appliance Technology and Features
- Cisco Adaptive Security Appliance and PIX Security Appliance Families
- Getting Started with Cisco Security Appliances
- Essential Security Appliance Configuration
- Configuring Translations and Connection Limits
- Using ACLS and Content Filtering
- Configuring Object Grouping
- Switching and Routing on Security Appliances
- Configuring AAA for Cut-Through Proxy
- Configuring the Cisco Modular Policy Framework
- Configuring Advanced Protocol Handling
- Configuring Threat Detection
- Configuring Site-to-Site VPNS Using PreShared Keys
- Configuring Security Appliance Remote Access VPNs
- Configuring Cisco Security Appliance for SSL VPN
- Configuring Transparent Firewalls Mode
- Configuring Security Contexts
- Configuring Failover
- Managing Security Appliances
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies is the big picture overview of a SOC, other courses provide a deep dive into the technologies that a SOC may utilize. This course addresses the internal workings of staff, skills required, required authorizations, internal agreements, and setting appropriate expectation levels of a SOC within budget constraints. A SOC is not a one size fits all, the instructor has decades of security experience and brings to the table opportunities to discuss what can work within constraints. Many organizations are coming to the realization that some level of a SOC is now required and to learn just what decisions need to be made: Out-sourced, In-sourced, budgets, capabilities and many more. Students leave with a worksheet of how to progress when they get back to their organization.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies – Is a course that incorporates lecture, demos, and group exercises for standing up a Security Operations Center (SOC). Students learn strategies and resources required to deploy, build, and run Network Security Monitoring (NSM) and work roles and flows for a SOC. No network is bullet proof and when attackers access your network, this course will show you options and resources to build a security net to detect, contain, and control the attacker. Examples on what it takes to architect an NSM solution to identify sophisticated attackers and a response strategy. Properly implemented detection and response technologies is integral to incident response and provides the responders timely information and tools to react to the incident. Effective demonstrations are given of Open Source technologies that build up a SOC, but any software can be used and demonstrations are provided to demonstrate technology families not push a specific solution.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies demonstrations utilize a cyber range that gives each student in-depth knowledge of monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls; and software and services to provide orchestrate Incident Response, Intelligence Analysis, and Hunt Operations.
Attendees to TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objective:
-
- To provide management an overview of what it takes to stand up a SOC.
Prerequisites:
- Students should have an understanding of the security field.
Course Outline:
- What threats does my organization care about?
- What does a threat look like?
- What does a threat look like?
- How to present the SOC internally.
- Communication with Stakeholders and Executives Leveraging and integrating existing security measures
- People
- Establishing a skill matrix and work roles for SOC members
- Establishing a training path
- Personnel background requirementsProcesses
- Processes
- Alignment to standards: NIST, PCI, HIPAA, etc.
- Risk related decision trees
- Playbooks
- Threat Intelligence Integration
- Technology – Tool Suites to Support:
- Ethical Hacking
- Network Security Monitoring and SIEM
- Forensics
- Dashboards
- Analysis and Hunting
- Incident Management and Ticketing
Comments
Latest comments from students
Liked the class? Then let everyone know!
DoD 8570 Training
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.

- CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar
- CT-205: A+ Certification Course
- CT-208: A+ Extended Boot Camp
- CT-225: Network+
- CT-325: Security+
- CT-395: CySA+ Cybersecurity Analyst
- CT-425: CompTIA SecurityX
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-545: Certified Network Defender
- TN-555: Certified Ethical Hacker v13 (CEH)
- TN-715: Systems Security Certified Practitioner (SSCP)
- TN-812: Information Systems Security Engineering Professional (ISSEP)
- TN-813: Certified in Governance, Risk and Compliance (CGRC)
- TN-8150: CISSP Certification Preparation Seminar
- TN-822: Certified Information Systems Auditor (CISA) Seminar
- TN-825: Certified Information Security Manager (CISM) Seminar
- TN-835: Certified in Risk and Information Systems Control (CRISC) Preparation Seminar
- TN-865: Wireshark Network Traffic and Security Analysis
For further information or to schedule for classes, call us at 800-324-2294
CCFE Core Competencies
- Procedures and Legal Issues
- Computer Fundamentals
- Partitioning Schemes
- Data Recovery
- Windows File Systems
- Windows Artifacts
- Report writing (Presentation of Finding)
- Procedures and Legal issues
- Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
- Ability to explain the on-scene action taken for evidence preservation.
- Ability to maintain and document an environment consolidating the computer forensics.
- Computer Fundamentals
- Understand BIOS
- Computer hardware
- Understanding of numbering system (Binary, hexadecimal, bits, bytes).
- Knowledge of sectors, clusters, files.
- Understanding of logical and physical files.
- Understanding of logical and physical drives.
- Partitioning schemes
- Identification of current partitioning schemes.
- Understanding of primary and extended partition.
- Knowledge of partitioning schemes and structures and system used by it.
- Knowledge of GUID and its application.
- Windows file system
- Understanding of concepts of files.
- Understanding of FAT tables, root directory, subdirectory along with how they store data.
- Identification, examination, analyzation of NTFS master file table.
- Understanding of $MFT structure and how they store data.
- Understanding of Standard information, Filename, and data attributes.
- Data Recovery
- Ability to validate forensic hardware, software, examination procedures.
- Email headers understanding.
- Ability to generate and validate forensically sterile media.
- Ability to generate and validate a forensic image of media.
- Understand hashing and hash sets.
- Understand file headers.
- Ability to extract file metadata from common file types.
- Understanding of file fragmentation.
- Ability to extract component files from compound files.
- Knowledge of encrypted files and strategies for recovery.
- Knowledge of Internet browser artifacts.
- Knowledge of search strategies for examining electronic
- Windows Artifacts
- Understanding the purpose and structure of component files that create the windows registry.
- Identify and capability to extract the relevant data from the dead registry.
- Understand the importance of restore points and volume shadow copy services.
- Knowledge of the locations of common Windows artifacts.
- Ability to analyze recycle bin.
- Ability to analyze link files.
- Analyzing of logs
- Extract and view windows logs
- Ability to locate, mount and examine VHD files.
- Understand the Windows swap and hibernation files.
- Report Writing (Presentation of findings)
- Ability to conclude things strongly based on examination observations.
- Able to report findings using industry standard technically accurate terminologies.
- Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
- Be able to consider legal boundaries when undertaking a forensic examination