Increase your credibility, job security, and career opportunities by reaching your goal and getting certified!  TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class.  We have a proven testing program that will get you the results you want!

    in   
     

    Course Overview:

    Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

    After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Outline:

    • Identity and access
      • Configure Azure Active Directory for Azure workloads and subscriptions
      • Configure Azure AD Privileged Identity Management
      • Configure security for an Azure subscription
    • Platform Protection
      • Understand cloud security
      • Build a network
      • Secure network
      • Implement host security
      • Implement platform security
      • Implement subscription security
    • Security Operations
      • Configure security services
      • Configure security policies by using Azure Security Center
      • Manage security alerts
      • Respond to and remediate security issues
      • Create security baselines
    • Data and Applications
      • Configure security policies to manage data
      • Configure security for data infrastructure
      • Configure encryption for data at rest
      • Understand application security
      • Implement security for application lifecycle
      • Secure applications
      • Configure and manage Azure Key Vault

    Prerequisites :

        • AZ-900: Microsoft Azure Fundamentals
        • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
        • Student must be able to program in an Azure Supported Language.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    DoD 8570 Training

    The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

    DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

    Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

    Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


     

     

      For further information or to schedule for classes, call us at 800-324-2294

       

      in   

        After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

        Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

        Scroll down to see the course description.

        First Name*

        Last Name*

        Your Email*

        Your Organization*

        Phone*

        Questions:

        After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

        Windows Security Automation and Threat Hunting with PowerShell Seminar

        Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

        Date: October 10, 2018 8:00am – 4:00pm

        Duration: 8 hours

        Audience: Cyber Security professionals and Windows administrators

        Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

        Description:
        PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

        Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

        Objectives:

        PowerShell Overview

        • Getting started running commands
        • Security cmdlets
        • Using and updating the built-in help
        • Execution policies
        • Fun tricks with the ISE graphical editor
        • Piping .NET and COM objects, not text
        • Using properties and methods of objects
        • Helping Linux admins feel more at home
        • Aliases, cmdlets, functions, modules, etc.

        PowerShell Utilities and Tips

        • Customizing your profile script
        • PowerShell remote command execution
        • Security setting across the network
        • File copy via PowerShell remoting
        • Capturing the output of commands
        • Parsing text files and logs with regex patterns
        • Parsing Security Logs
        • Searching remote event logs
        • Mounting the registry as a drive
        • Security settings in the Registry
        • Exporting data to CSV, HTML and JSON files
        • Running scripts as scheduled jobs
        • Continued Security Compliance
        • Pushing out scripts through Group Policy
        • Importing modules and dot-sourcing functions
        • http://www.PowerShellGallery.com

        PowerShell Scripting

        • PowerShell Scripting to implement Security Practices
        • Writing your own functions to automate security status and settings
        • Passing arguments into your scripts
        • Function parameters and returning output
        • Flow control: if-then, foreach, that make security decisions
        • How to pipe data in/out of your scripts for security compliance and reporting

        Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

        CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.

        SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.

        Course Objectives:

        • Apply AI concepts to strengthen your organization’s cybersecurity posture
        • Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
        • Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
        • Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
        • Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
        • Integrate AI securely into DevSecOps pipelines and enterprise security strategies.

        Dates/Locations:

        No Events

        Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended

        SecAI+ (V1) exam objectives summary

             Basic AI concepts related to cybersecurity (17%)

        • Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
        • Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations. 
        • Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.

        Securing AI systems (40%)

        • Implement security controls: Protect AI systems, data, and models using robust technical safeguards. 
        • Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures. 
        • Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers. 

        AI-assisted security (24%)

        • Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation. 
        • Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration. 
        • Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring. 

        AI governance, risk, and compliance (19%)

        • Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption. 
        • Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle. 
        • Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.