Course Overview:

TechNow’s Course provides existing .NET developers with practical information and labs that enables them to build solutions on the Microsoft SharePoint 2010/2013 platform.

Attendees to MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Introduction to SharePoint 2010/2013 Development Platform
  • Using SharePoint 2010/2013 Developer Tools
  • Developing SharePoint 2010/2013 Web Parts
  • Working with SharePoint Objects on the Server
  • Creating Event Receivers and Application Settings
  • Developing Solutions by Using Business Connectivity Services
  • Developing SharePoint 2010/2013 Workflows
  • Working with Client-based APIs for SharePoint 2010/2013
  • Developing Interactive User Interfaces
  • Developing Silverlight Applications for SharePoint
  • Developing Sandboxed Solutions
  • Working with SharePoint Server Profiles and Taxonomy APIs
  • Developing Content Management Solutions

    Prerequisites:

    • An understanding of the problem-solving techniques that apply to software development
    • Approximately 12 months experience with ASP .NET 3.5 with Visual Studio 2008 (or later)
    • Approximately 1 month development experience with SharePoint 2007 or SharePoint 2010/2013 and VS2010/2013 (includes beta releases) creating code that interacts with the SharePoint Sever-side APIs
    • Experience performing end user tasks with SharePoint 2007 or SharePoint 2010/2013 and an understanding of the purpose and use of the following:
      • Lists
      • Documents and Libraries
      • Personalizing an SP Page/Site
      • Using MySites
      • Using SharePoint Designer

    Comments

    Latest comments from students


    User: kelleyd10

    Instructor comments: Clay was / is an outstanding instructor. He was very flexible in what the class needed. He was very accommodating and resourceful in answering the class questions. Clay's teaching style is greatly appreciated.

    Facilities comments: Were good


    User: dennij

    Instructor comments: Very professional and knowledgeable. Available before and after class.

    Facilities comments: Location was nice but too far from Lackland.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.

    Course Objectives:

    • Install and troubleshoot Ansible on central nodes and managed hosts
    • Automate administration tasks with Ansible playbooks and ad hoc commands
    • Write effective Ansible playbooks
    • Protect sensitive data used by tasks with Ansible Vault.
    • Install and configure Ansible Tower for enterprise Ansible management
    • Use Ansible Tower to control access to inventories and machine credentials by users and teams
    • Create job templates in Ansible Tower to standardize playbook execution.
    • Centrally launch playbooks and monitor and review job results with Ansible Tower

     

    Course Outline:

    • Introduce Ansible
    • Deploy Ansible
    • Implement playbooks
    • Manage variables and inclusions
    • Implement task control
    • Implement Jinja2 templates
    • Implement roles
    • Configure complex playbooks
    • Implement Ansible Vault
    • Troubleshoot Ansible
    • Install Ansible Tower and describe Ansible Tower’s architecture
    • Create users and teams for role-based access control
    • Create and manage inventories and credentials
    • Manage projects for provisioning with Ansible Tower
    • Construct advanced job workflows
    • Update inventories dynamically and compare inventory members
    • Maintenance and administration of Ansible Tower

     
    Dates/Locations:

    No Events

    Duration: 5 Days

    Prerequisites:

    • Become a Red Hat Certified System Administrator, or demonstrate equivalent experience

    Target Audience:

    This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.

     


    Course Overview:

    This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.

    Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.

    This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

    You will learn how to protect, detect and respond to, and predict threats on the network.  This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.

    You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.

    This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

     

    What’s Included:

    • EC-Council official E-Courseware
    • EC-Council iLabs access included for 6 months
    • EC-Council official Certificate of Attendance
    • CND Exam Voucher with 1 FREE RETAKE VOUCHER

     

    Security Course Flow
    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

    • Module 01. Network and Defense Strategies
    • Module 02. Administrative Network Security
    • Module 03. Technical Network Security
    • Module 04. Network Perimeter Security
    • Module 05. Endpoint Security-Windows Systems
    • Module 06. Endpoint Security- Linux Systems
    • Module 07. Endpoint Security- Mobile Devices
    • Module 08. Endpoint Security- IoT Devices
    • Module 09. Administrative Application Security
    • Module 10. Data Security
    • Module 11. Enterprise Virtual Network Security
    • Module 12. Enterprise Cloud Network Security
    • Module 13. Enterprise Wireless Network Security
    • Module 14. Network Traffic Monitoring and Analysis
    • Module 15. Network Logs Monitoring and Analysis
    • Module 16. Incident Response and Forensic Investigation
    • Module 17. Business Continuity and Disaster Recovery
    • Module 18. Risk Anticipation with Risk Management
    • Module 19. Threat Assessment with Attack Surface Analysis
    • Module 20. Threat Prediction with Cyber Threat Intelligence

     

    Prerequisites:

    • Basic network and host operations knowledge
    • Experience commensurate with one to five years of network, host, or application administration
    • TN-325:Security+   or equivalent

     

    Courses to follow:

     

    Target Audience:

    Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations

     

    About us:

    TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

    Tech Now, Inc. is an accredited Training Center with Ec-Council.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview:

    TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment.  Security teams wrestle with the impact and liability of Cloud computing on an organization.  This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).

    Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment.  Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy.  Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds.   Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.

    Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 3 days

    Course Objectives:

    • Cloud computing introduction
    • Security challenges in the cloud
    • Infrastructure security in the cloud
    • Policy, risk, and governance for cloud computing
    • Compliance and legal considerations
    • Audit and assessment for the cloud
    • Data security in the cloud
    • Identity and Access Management (IAM)
    • Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
    • Intrusion detection and incident response

    Course Prerequisites:

    • GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures
    • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

    Comments

    Latest comments from students


    User: reedrobt

    Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?

    Facilities comments: Home2 location was well-kept and convenient to other services.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM.  Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.

    Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.

    At the end of this course, you should understand the features and operations of View and be able to:

    • Install and configure View components
    • Create and manage dedicated and floating desktop pools
    • Deploy and manage linked-clone virtual desktops
    • Configure and manage desktops that run in local mode
    • Configure secure access to desktops through a public network
    • Use ThinApp to package applications

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Module 1: Course Introduction
    • Module 2: Introduction to VMware View
    • Module 3: View Connection Server
    • Module 4: View Desktops
    • Module 5: View Client Options
    • Module 6: View Administratory
    • Module 7: Configuring and Managing Linked Clones
    • Module 8: Local-Mode Desktops
    • Module 9: Command-Line Tools and Backup Options
    • Module 10: Managing VMware View Security
    • Module 11: View Manager Performance and Scalability
    • Module 12: VMware® ThinAppTM

    Prerequisites:

    • VM-315: VMware Infrastructure: Install, Configure and Manage
    • Experience in Microsoft Windows Active Directory Administration
    • Experience with VMware vSphereTM
    • Before attending the course, students must be able to perform the following tasks:
      • Create a template in VMware vCenterTM Server and deploy a virtual machine from it
      • Modify a template customization file
      • Open a virtual machine console in vCenter Server and access the guest operating system
      • Configure Active Directory services

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!