Course Overview:

Red Hat System Administration: Linux Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration.  TechNow’s  Ansible course facilitates the dynamic IT infrastructure through automation.

This course also supports DevOps practices through Ansible playbooks automating workflows.  TechNow has operated Automated Unix and Linux environment for over 35 years and brings this field experience to the classroom utilizing ansible and discussing its impact on: Infrastructure (Linux, Windows, network devices), Cloud automation (AWS and Azure), Application deployment, Security & compliance, and CI/CD pipelines.

This course also ties in nicely with the TechNow course CL-355: Containers, Kubernetes, and Red Hat OpenShift Administration which provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1).

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • An introduction to Ansible
  • Install and configure Ansible development tools in VS Code and configure Ansible setting
  • Create and update inventories of managed hosts and manage connections to them
  • Automate administration tasks with Ansible Playbooks
  • Write effective playbooks at scale
  • Protect sensitive data used by Ansible Automation Platform with Ansible Vault
  • Reuse code and simplify playbook development with Ansible Roles and Ansible Content Collections
  • Developing Automation Content: Variables, Task Control, Deploying Files
  • Developing Automation Content at Scale
  • Reusing Code with Ansible Roles and Content Collections
  • Automate Linux Administration Tasks

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

This course provides students with the knowledge and skills to implement a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to implementing a database.

Attendees to MS-6232: Implementing a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Creating Databases and Databases Files
  • Creating Data Types and Tables
  • Creating and Tuning Indexes
  • Implementing Data Integrity by Using Constraints and Triggers
  • Using XML
  • Implementing Views
  • Implementing Stored Procedures
  • Implementing Functions
  • Implementing Managed Code in the Database
  • Managing Transactions and Locks
  • Using Service Broker

Prerequisites:

  • Basic knowledge of the Microsoft Windows operating system and its core functionality
  • Working knowledge of Transact-SQL
  • Working knowledge of relational databases
  • Some experience with database design

Comments

Latest comments from students


User: bangbangsplat

Instructor comments: some kind of presentation would have been helpful in learning the objectives of the course (PowerPoint, drawing on easel, etc.) It seemed like the instructor is not too familiar with the error codes we were receiving during the Practice Exams.

Facilities comments: preferred to have the location located in a less busy area of the city


User: smaxam

Instructor comments: Clay was very knowledgable but had to repeat questions a number of times to get his attention.

Facilities comments: Holiday Inn was nice


Liked the class?  Then let everyone know!

 

 

 

 

 

 

Course Overview:

PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

 

 

 

 

What’s Included:

  • 5 days of instructor led in classroom training
  • Labs
  • PenTest+ Courseware
  • Exam Voucher
  • PenTest+ onsite exam scheduling

Course Objectives:

  • Plan and scope penetration tests
  • Conduct passive reconnaissance
  • Perform non-technical tests to gather information
  • Conduct active reconnaissance
  • Analyze vulnerabilities
  • Penetrate networks
  • Exploit host-based vulnerabilities
  • Test application
  • Complete post-exploit tasks
  • Analyze and report pen test results

Dates/Locations:

No Events

Duration: 5 Days

Course Content:

    • Module 01. Planning and Scoping Penetration Tests
    • Module 02. Conducting Passive Reconnaissance
    • Module 03. Performing Non-Technical Tests
    • Module 04. Conducting Active Reconnaissance
    • Module 05. Analyzing Vulnerabilities
    • Module 06. Penetrating Networks
    • Module 07. Exploiting Host-Based Vulnerabilities
    • Module 08. Testing Applications
    • Module 09. Completing Post-Exploit Tasks
    • Module 10. Analyzing and Reporting Pen Test Results

 

Prerequisites:

Target Audience:

This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.

TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

Here are courses about specilaized Software or Hardware:

in