- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
We are often asked what is the recommended sequence of classes. Here is our recommended sequence of classes for The Security Field.
Certified Information Security Manager (CISM)
CT-325 CompTIA Security+ | ![]() |
TN-825 Certified Information Security Manager |
Certified Information Systems Auditor(CISA)
CT-325 CompTIA Security+ | ![]() |
TN-425 Certified Ethical Hacker | ![]() |
TN-822: Certified Information Systems Auditor (CISA) |
Certified Information Systems Security Professional(CISSP)
CT-325 CompTIA Security+ | ![]() |
TN-425 Certified Ethical Hacker | ![]() |
TN-815 CISSP Certification Prep Seminar |
Course Overview:
This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.
Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- The Current State of the Telecom Industry
- Telecom Service Providers
- Digitalizing Voice
- Communication Mediums and Multiplexing
- Carrier Access: Customer-to-Carrier Connections
- Broadband Access
- Enterprise Networks
- Carrier Transport Services
- Data Communications and Packet-Switched Networks
- Migrating Voice from Circuit-to-Packet-Switched Networks
- Carrier Data Services
- Ethernet Services
- Remote Access Virtual Private Networks (VPNs)
- Video Technology and Services
- Current Mobile Wireless Services
- Fixed Mobile Convergence (FMC)
- Worldwide Interoperability for Microwave Access (WiMax)
- Multimedia Subsystem (IMS)
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
User: dhonore
Instructor comments: Dave's presentation style is engaging and lively.
Facilities comments: The room was adequate for the needs of the class.
User: phouck
Instructor comments: David was very good. Although he went very fast at times.
Facilities comments: The room was ok. it was bit dark.
Liked the class? Then let everyone know!
Course Overview:
The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances, and maintaining an enterprise deployment of OpenStack. This course also teaches the management and customization of an enterprise deployment of OpenStack (overcloud) and how to manage compute nodes with Red Hat OpenStack Platform director (undercloud).
Attendees to CL-345: Red Hat OpenStack Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Prerequisites:
This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.
Prerequisites for this course is Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent experience.
Attend Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL115), or demonstrate equivalent experience
Course Outline:
- Navigate the Red Hat OpenStack Platform architecture
- Describe the OpenStack control plane
- Integrate Identity Management
- Perform image operations
- Manage storage
- Manage OpenStack networking
- Manage compute resources
- Automate could applications
- Troubleshoot OpenStack operations
- Comprehensive review
Comments
Latest comments from students