- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Are you looking for a Cisco Training Course?
Your organization needs qualified professionals who can design, implement, and operate Cisco multiprotocol internet works. With Cisco training from TechNow, you can gain the knowledge and experience your organization needs to succeed.
TechNow’s Cisco Training and Certification Career Path takes students from the fundamentals of networking through a complete line of Cisco courses designed to give students the knowledge and experience they need to master Cisco networking skills in a fast, thorough, and efficient manner.
Our Cisco training courses will prepare you for your work towards Cisco certification. With years of experience in the Cisco training environment, TechNow can lead you through a dynamic experience to prepare you for Cisco certification.
A list of our Cisco Courses.
- N-305: CCNA Bootcamp
- N-310: CCNA Extended Bootcamp
- N-315: Cisco Secure Virtual Private Networks
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-405: ROUTE-Implementing Cisco IP Routing
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-455: Securing Networks with ASA Fundamentals (SNAF)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- N-495: Voice-over IP (VoIP) Foundations
- N-515: Implementing Cisco Enterprise Wireless Networks (ENWLSI)
- N-595: VoIP Security Analysis and Design
- TN-865: Wireshark Network Traffic and Security Analysis
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.
Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.
Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Introduction to Privacy Program Management
- Module 2: Privacy Governance
- Module 3: Applicable Laws and Regulations
- Module 4: Data Assessments
- Module 5: Policies
- Module 6: Data Subjects’ Rights
- Module 7: Training and Awareness
- Module 8: Protecting Personal Information
- Module 9: Data Breach Incident Plans
- Module 10: Measuring, Monitoring and Auditing Program Performance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students