Course Overview:

Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Outline:

  • Identity and access
    • Configure Azure Active Directory for Azure workloads and subscriptions
    • Configure Azure AD Privileged Identity Management
    • Configure security for an Azure subscription
  • Platform Protection
    • Understand cloud security
    • Build a network
    • Secure network
    • Implement host security
    • Implement platform security
    • Implement subscription security
  • Security Operations
    • Configure security services
    • Configure security policies by using Azure Security Center
    • Manage security alerts
    • Respond to and remediate security issues
    • Create security baselines
  • Data and Applications
    • Configure security policies to manage data
    • Configure security for data infrastructure
    • Configure encryption for data at rest
    • Understand application security
    • Implement security for application lifecycle
    • Secure applications
    • Configure and manage Azure Key Vault

Prerequisites :

      • AZ-900: Microsoft Azure Fundamentals
      • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
      • Student must be able to program in an Azure Supported Language.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • TN-822: Certified Information Systems Auditor (CISA) Seminar
    • 10/06/2025 – 10/10/2025
    • San Antonio
  • CT-213: Cloud Essentials+
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • PM-223: Introduction to Project Management
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • in   

    Course Overview:

    The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).

    Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
    • Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
    • Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
    • Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
    • Optimize OSPFv2 and OSPFv3 behavior
    • Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
    • Implement route redistribution using filtering mechanisms
    • Troubleshoot redistribution
    • Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
    • Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
    • Optimize MP-BGP in IPv4 and IPv6 environments
    • Troubleshoot MP-BGP for IPv4 and IPv6
    • Describe the features of Multiprotocol Label Switching (MPLS)
    • Describe the major architectural components of an MPLS VPN
    • Identify the routing and packet forwarding functionalities for MPLS VPNs
    • Explain how packets are forwarded in an MPLS VPN environment
    • Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
    • Implement Dynamic Host Configuration Protocol (DHCP)
    • Describe the tools available to secure the IPV6 first hop
    • Troubleshoot Cisco router security features
    • Troubleshoot infrastructure security and services

    Prerequisites:

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    An in-depth course on how to use and configure Cisco Firepower Threat Defense technology,  from device setup and configuration and including routing, high availability, Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).  Students implement advanced Next Generation Firewall (NGFW) and Next Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network based malware detection, and deep packet inspection.
    Students will also learn how to configure site to site VPN, remote access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.  This course combines lecture materials and hands on labs throughout to make sure that students are able to successfully deploy and manage the Cisco Firepower system.

    It is a five-day instructor-led course that is aimed at providing network security engineers with the knowledge and skills that are needed to implement and maintain perimeter solutions that are based on Cisco Firepower security appliances. At the end of the course, students will be able to reduce risk to their IT infrastructure and applications using Cisco Firepower security appliance features, and provide detailed operations support for the Firepower appliance.

    Attendees to N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Understand Sourcefire, Firepower 6.2, FireAMP, and Firepower Threat Defense (FTD)
    • Configure the Firepower Management Center (FMC)
    • Raise you confidence managing the Firepower Manager and Firepower tThreat Defense (FTD)
    • Describe the Cisco Firepower Systems infrastructure
    • Navigate the user interface and administrative features of the Cisco Firepower 6.2 system, including advanced analysis and reporting functionality to properly assess threats
    • Describe the System Configuration and Health policies and implement them
    • Describe the role Network Discovery (Firepower) technology plays in the Cisco devices
    • Describe, create, and implement objects for use in Access Control policies
    • Create DNS and URL policies and configure Sinkholes
    • Configure FTD policies such as Platform, Routing, Interface, Zones, PreFilter, QoS, NAT and Flex Config!
    • Describe advanced policy configuration and Firepower system configuration options
    • Configure Malware Policies to find and stop Malware
    • Understand Security Intelligence, and how to configure SI to stop attacks NOW!
    • Configure policies to find and stop Ransomware
    • Understand how to fine tune IPS policies
    • Understand how to find tun Snort Preprocessor policies (NAP)
    • Configure Correlation events, white rules, traffic profiles and create respective events and remediate them
    • Analyze events
    • Create reporting templates and schedule them
    • Configure backups, rule updates, Firepower Recommendations, URL updates, and more to run every week automatically
    • Set up external authentication for users using LDAP/Realms
    • Configuring system integration, realms, and identity sources
    • Configure FMC domains and implement them
    • Configure FTD HA with two FTD devices
    • SSL Policy – decrypt your traffic
    • AnyConnect and Site-to-Site VPN
    • Understand network and host based AMP.  Configure and analyze host based AMP
    • Understand Cisco Identity Services Engine (ISE)
    • Configure ISE and integrate with Cisco FMC identity policy using PxGrid

    Prerequisites:

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.

    Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Toolkit and Lab Assembly
    • Malware Code and Behavioral Analysis Fundamentals
    • Malicious Static and Dynamic Code Analysis
    • Collecting/Probing System and Network Activities
    • Analysis of Malicious Document Files
    • Analyzing Protected Executables
    • Analyzing Web-Based Malware
    • DLL Construction and API Hooking
    • Common Windows Malware Characteristics in x86 Assembly
    • Unpacking Protected Malware
    • In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
    • In-Depth Analysis of Malicious Executables
    • Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis

    Prerequisites:

    • Strong understanding of core systems and network concepts
    • Exposure to programming and assembly concepts
    • Comfortable with command line access

    Comments

    Latest comments from students



    User: marcus.osullivan

    Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.

    Facilities comments: The baby deer were neat! I like the resort.


    Liked the class?  Then let everyone know!