Course Overview:
Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Outline:
- Identity and access
- Configure Azure Active Directory for Azure workloads and subscriptions
- Configure Azure AD Privileged Identity Management
- Configure security for an Azure subscription
- Platform Protection
- Understand cloud security
- Build a network
- Secure network
- Implement host security
- Implement platform security
- Implement subscription security
- Security Operations
- Configure security services
- Configure security policies by using Azure Security Center
- Manage security alerts
- Respond to and remediate security issues
- Create security baselines
- Data and Applications
- Configure security policies to manage data
- Configure security for data infrastructure
- Configure encryption for data at rest
- Understand application security
- Implement security for application lifecycle
- Secure applications
- Configure and manage Azure Key Vault
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Students should have 1-2 years professional development experience and experience with Microsoft Azure.
- Student must be able to program in an Azure Supported Language.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
In this course students will learn to install the Linux™ operating system, to administer users and software, to use vi, basic Linux security, process control, file system maintenance, backup and recovery, including some basic networking concepts. This course insures that students have the skills to configure all desktop and client side related activity.
Attendees to L-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Linux operating system installation
- Hardware Issues
- LILO & GRUB Configuration
- Managing the Linux file system
- Boot Process
- Customization of setup files
- System Startup
- Run Levels
- Network Services
- User Management
- Changing Passwords
- Monitoring, accessing & restricting root system access
- Administration Tools
- Disk Management
- Quotas
- Process Control
- Installing & removing software & patches
- Network Configuration
- Client side components of NFS, Samba, NTP, NIS
- Printing
- Backup and Recovery
- Using utilities for process control, locating files & automating maintenance tasks
Prerequisites:
- Students should have an understanding of all basic UNIX commands as well as variable substitution, wild card expansion, command pipes, permissions, the grep and find commands.
- These prerequisites can be met through completion of TN-125: Introduction to UNIX & Linux and six month’s experience with Linux.
Comments
Latest comments from students
User: flores2015
Instructor comments: Very Good Instructor (Bill Peterson)
Facilities comments: Nice - Can't wait for your new facility.
Liked the class? Then let everyone know!
Course Overview:
TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam. The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.
This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try. We encourage our students to take the exam within a week after course completion. The goal for this course is a pass rate of one and done. Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days. TechNow has a proven CISSP track record that you can depend on.
Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 10 Days
Course Objectives:
Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communications and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Prerequisites:
To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:
- 4 years of experience in the information security field
- or 3 years experience & a college degree
Contact TechNow to verify that you qualify.
Comments
Latest comments from students
Facilities comments:
User: pulliamp
Instructor comments:
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.