TechNow offers many courses that also have a related certification exam. As an Authorized Peason VUE testing center, we offer exams for many certifications. Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.
(ISC)², CBK, and CISSP are registered marks of the International Information Systems Security Certification Consortium in the United States and other countries.
Access, Excel, Hyper-V, Outlook, Microsoft, SharePoint, Silverlight, SQL Server, Visual Basic, Win32, Windows, Windows PowerShell and Windows Server are registered trademarks of Microsoft Corporation.
Adobe, Acrobat, Flash and Photoshop are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries
Amazon Web Services is a trademark of Amazon.com, Inc.
Android is a trademark of Google Inc.
APMG-International Change Management, The APMG-International Change Management and Swirl Device logo, APMG-International AgilePM and The APMG-International AgilePM and Swirl Device logo are trademarks of The APM Group Limited.
Certified Ethical Hacker (CEH) is a registered trademark of EC-Council.
Cisco is a registered trademark of Cisco Systems Inc.
CMMI® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
CAPM, Certified Associate in Project Management (CAPM), PMP, Project Management Professional (PMP), PMI-ACP, PMI Agile Certified Practitioner (PMI-ACP), PMBOK, and the R.E.P. Logo are marks of Project Management Institute, Inc.
CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
Certified Business Analysis Professional, Certification of Competency in Business Analysis, Endorsed Education Provider, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
COBIT is a trademark of ISACA, registered in the U.S. and other countries.
COBIT® 5 is a trademark of the Information Systems Audit and Control Association® (ISACA®). This product includes COBIT® 5, used by permission of ISACA®. 2012© ISACA®. All rights reserved.
CompTIA A+ and CompTIA Network+ are registered trademarks of the Computing Technology Industry Association, Inc.
CompTIA CASP and CompTIA Cloud Essentials are trademarks of the Computing Technology Industry Association, Inc.
GIAC and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
Hadoop is a registered trademark of the Apache Software Foundation.
Hibernate is a registered trademark and servicemark of Red Hat, Inc.
iPad, iPhone, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
ITIL®, PRINCE2® and MSP® are registered trademarks of AXELOS Limited.
JavaScript, JavaServer, JavaServer Pages, Enterprise JavaBeans, MySQL and PL/SQL are trademarks of Oracle Corporation.
Linux is a registered trademark of Linus Torvalds.
Java and Oracle are registered trademarks of Oracle Corporation.
Palo Alto Networks, PAN-OS, App-ID, Content-ID, Url-ID, GlobalProtect, Wildfire, and Panorama are trademarks of Palo Alto Networks, Inc.
"Python" is a registered trademark of the Python Software Foundation, used by Learning Tree International with permission from the Foundation.
Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries.
Red Hat Middleware, LLC. All rights reserved.
SANS and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
SAP Crystal Reports is the registered trademark of SAP AG in Germany and in several other countries.
Scrum Alliance REPSM is a service mark of Scrum Alliance, Inc. Any unauthorized use is strictly prohibited.
TechNow® is a registered trademark of TechNow Incorporated.
The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved.
The Swirl logo™ is a trademark of AXELOS Limited.
Transact-SQL is a trademark of Sybase, Inc.
UNIX is a registered trademark of The Open Group.
VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
XML is a trademark of MIT, INRIA or Keio on behalf of the World Wide Web Consortium.
Course Overview:
Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.
Course Objectives:
- Install and troubleshoot Ansible on central nodes and managed hosts
- Automate administration tasks with Ansible playbooks and ad hoc commands
- Write effective Ansible playbooks
- Protect sensitive data used by tasks with Ansible Vault.
- Install and configure Ansible Tower for enterprise Ansible management
- Use Ansible Tower to control access to inventories and machine credentials by users and teams
- Create job templates in Ansible Tower to standardize playbook execution.
- Centrally launch playbooks and monitor and review job results with Ansible Tower
Course Outline:
- Introduce Ansible
- Deploy Ansible
- Implement playbooks
- Manage variables and inclusions
- Implement task control
- Implement Jinja2 templates
- Implement roles
- Configure complex playbooks
- Implement Ansible Vault
- Troubleshoot Ansible
- Install Ansible Tower and describe Ansible Tower’s architecture
- Create users and teams for role-based access control
- Create and manage inventories and credentials
- Manage projects for provisioning with Ansible Tower
- Construct advanced job workflows
- Update inventories dynamically and compare inventory members
- Maintenance and administration of Ansible Tower
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Become a Red Hat Certified System Administrator, or demonstrate equivalent experience
Target Audience:
This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.
Course Overview
Sharepoint is becoming an institution in the modern office. Collaboration, file sharing, and even internal social sites are all available in SharePoint 2010/2013. Take advantage of all that Sharepoint has to offer. Learn to install, configure and administer SharePoint 2010/2013, by taking this 5 day course.
Attendees to MS-10174: Configuring and Administering SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.
Dates/Locations
No Events
Duration: 5 Days
Course Objectives:
- Prepare and Install SharePoint 2010/2013
- Configure the Fundamental Services and Logical Components
- Administer SharePoint Using Command Line, User Interface and Powershell
- Manage Content in Lists and Libraries
- Install, Configure, and Operate a SharePoint Farm
Prerequisites
- Students should be experienced Windows 2003 or Windows 2008 server administrators
Comments
Latest comments from students
Liked the class? Then let everyone know!
Here are the security courses specific to TechNow:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- N-595: VoIP Security Analysis and Design
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-8155: HCISPP Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-963: Windows Security Automation with PowerShell