After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

     

    Course Overview:

    This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.

    Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.

    Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.

    Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Virtual Infrastructure Overview
    • ESX and ESXi Server Installation
    • Configuration of Networking, Scalability and Security
    • Storage
    • Install and Configure vCenter Server and Components
    • Creation, Deployment, Management, and Migration of Virtual Machines
    • Utilize vCenter Server for Resource Management
    • Utilize vCenter Server for Virtual Machine Access Control and User Managment
    • Use vCenter Server to increase scalability
    • Monitoring Your Environment
    • Data & Availability Protection Troubleshooting
    • Use VMware vCenter Update Manager to apply ESXi patches
    • Use vCenter Server to manage vMotion, HA, DRS and data protection.

    Welcome to TechNow! The Leader in Information Security Training & Computer Training.

    The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

    TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

    TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

    .

    Upcoming Events

  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • CT-215: Cloud+
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • TN-125: Introduction to UNIX and Linux
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • in   

    Course Overview:

    An in-depth course on how to use and configure Cisco Firepower Threat Defense technology,  from device setup and configuration and including routing, high availability, Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).  Students implement advanced Next Generation Firewall (NGFW) and Next Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network based malware detection, and deep packet inspection.
    Students will also learn how to configure site to site VPN, remote access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.  This course combines lecture materials and hands on labs throughout to make sure that students are able to successfully deploy and manage the Cisco Firepower system.

    It is a five-day instructor-led course that is aimed at providing network security engineers with the knowledge and skills that are needed to implement and maintain perimeter solutions that are based on Cisco Firepower security appliances. At the end of the course, students will be able to reduce risk to their IT infrastructure and applications using Cisco Firepower security appliance features, and provide detailed operations support for the Firepower appliance.

    Attendees to N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Understand Sourcefire, Firepower 6.2, FireAMP, and Firepower Threat Defense (FTD)
    • Configure the Firepower Management Center (FMC)
    • Raise you confidence managing the Firepower Manager and Firepower tThreat Defense (FTD)
    • Describe the Cisco Firepower Systems infrastructure
    • Navigate the user interface and administrative features of the Cisco Firepower 6.2 system, including advanced analysis and reporting functionality to properly assess threats
    • Describe the System Configuration and Health policies and implement them
    • Describe the role Network Discovery (Firepower) technology plays in the Cisco devices
    • Describe, create, and implement objects for use in Access Control policies
    • Create DNS and URL policies and configure Sinkholes
    • Configure FTD policies such as Platform, Routing, Interface, Zones, PreFilter, QoS, NAT and Flex Config!
    • Describe advanced policy configuration and Firepower system configuration options
    • Configure Malware Policies to find and stop Malware
    • Understand Security Intelligence, and how to configure SI to stop attacks NOW!
    • Configure policies to find and stop Ransomware
    • Understand how to fine tune IPS policies
    • Understand how to find tun Snort Preprocessor policies (NAP)
    • Configure Correlation events, white rules, traffic profiles and create respective events and remediate them
    • Analyze events
    • Create reporting templates and schedule them
    • Configure backups, rule updates, Firepower Recommendations, URL updates, and more to run every week automatically
    • Set up external authentication for users using LDAP/Realms
    • Configuring system integration, realms, and identity sources
    • Configure FMC domains and implement them
    • Configure FTD HA with two FTD devices
    • SSL Policy – decrypt your traffic
    • AnyConnect and Site-to-Site VPN
    • Understand network and host based AMP.  Configure and analyze host based AMP
    • Understand Cisco Identity Services Engine (ISE)
    • Configure ISE and integrate with Cisco FMC identity policy using PxGrid

    Prerequisites:

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course is developed for those individuals seeking to pass the Project Management Institute’s PMI-ACP Exam. PMI Agile Certified Practitioner (PMI-ACP)® is one of the newest certifications offered by PMI and is expected to become the industry standard certification for agile over the next few years. The PMI-ACP® certification clearly illustrates to colleagues, organizations or even potential employers that students are ready and able to lead in this new age of product development, management, and delivery.

    While preparing you for the exam, you will explore various approaches to agility including Scrum, Kanban, Lean, Extreme Programming (XP), and Test-Driven Development (TDD). By the end of the course, you’ll have mastered the practices and techniques that Agile practitioners use to improve team performance, resolve problems and engage in continuous process improvements and be equipped with job-ready skills.

    This course provides students with 21 contact hours in agile practices to help attain the Project Management Institute (PMI)® credential.  PMI® and PMI-ACP® are registered marks of the Project Management Institute, Inc.

    Attendees to PM-224: PMI Agile Certified Practitioner (PMI-ACP) Prep Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    11/17/2025 - 11/19/2025
    08:00 -16:00
    PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    TechNow, Inc, San Antonio TX

    Duration: 4 Days

    Course Objectives:

    • Agile Principles and Mindset
    • Value-driven delivery
    • Stakeholder engagement
    • Team performance
    • Adaptive planning
    • Problem detection and Resolution
    • Continuous Improvement

    Prerequisites:

    • Secondary degree
    • 21 contact hours of training in agile practices
    • 12 months of general project experience within the last 5 years. A current PMP® or PgMP® will satisfy this requirement but is not required to apply for the PMI-ACP
    • 8 months of agile project experience within the last 3 years

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!