Course Overview:

This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform.  The course focuses on C# program structure, language syntax & implementation details.  C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++.  It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.

Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Overview of the Microsoft .NET Platform Overview of C#
  • Using Value-Type Variables
  • Statements & Exceptions
  • Methods & Parameters
  • Arrays
  • Essentials of Object-Oriented Programming
  • Using Reference-Type Variables
  • Creating & Destroying Objects
  • Inheritance in C#
  • Aggregation, Namespaces & Advanced Scope
  • Operators & Events Properties & Indexes
  • Attributes

Prerequisites:

  • Experience with programming in C, C++, Visual Basic, Java or another programming language

 

Comments

Latest comments from students


User: jdmccol

Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.

Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.



 

Liked the class?  Then let everyone know!

 

Course Overview: 

This course details how a well-educated Product Owner and a knowledgeable Scrum Master can work together to deliver a successful product with Agile principles using SCRUM approach.  Designed specifically for students who want to learn the mechanics of an Agile / Scrum team being led by a Product Owner and a Scrum Master.

This course offers a firm grasp of Agile principles as they relate to new product development.  If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course covers the Agile adaptive life cycle framework and everything in between.

Attendees to PM-232: Product Owner and Scrum Master Roles in AGILE using SCRUM will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Understand the Scrum Flow, the core components of the Scrum framework
  • Understand the principles of empirical process control
  • Understand the scope of the Product Owner role in detail
  • Understand the scope of the Scrum Master role at a high level
  • Understand the scope of the Scrum team roles and why there is no project manager
  • Understand how the Scrum Master measures team velocity
  • Understand the importance of having the product vision as an overarching goal galvanizing the entire Scrum team
  • Understand the relationship between the vision and the product roadmap
  • Understand the different estimation levels in Scrum
  • Understand what the Product Backlog is and what it is not
  • Understand Product Backlog grooming
  • Understand that Scrum planning is adaptive, iterative, incremental, and collaborative

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun.  When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks.  We then cable the switch to the Palo Alto Networks Firewall.  Each student gets their own Palo Alto Firewall Pod of hardware and software.  What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall.  The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services.  The Trust VLAN has Windows and Linux clients.  The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN.  All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.  

After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment.  Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed.  Using packet captures, custom APP-ID's  and custom signatures are generated.  Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response.  It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment.  In the end we have a good understanding of the Palo Alto Networks Firewall.

CCFE Core Competencies

  • Procedures and Legal Issues
  • Computer Fundamentals
  • Partitioning Schemes
  • Data Recovery
  • Windows File Systems
  • Windows Artifacts
  • Report writing (Presentation of Finding)
  • Procedures and Legal issues
  1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
  2. Ability to explain the on-scene action taken for evidence preservation.
  3. Ability to maintain and document an environment consolidating the computer forensics.
  • Computer Fundamentals
  1. Understand BIOS
  2. Computer hardware
  3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
  4. Knowledge of sectors, clusters, files.
  5. Understanding of logical and physical files.
  6. Understanding of logical and physical drives.
  • Partitioning schemes
  1. Identification of current partitioning schemes.
  2. Understanding of primary and extended partition.
  3. Knowledge of partitioning schemes and structures and system used by it.
  4. Knowledge of GUID and its application.
  • Windows file system
  1. Understanding of concepts of files.
  2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
  3. Identification, examination, analyzation of NTFS master file table.
  4. Understanding of $MFT structure and how they store data.
  5. Understanding of Standard information, Filename, and data attributes.
  • Data Recovery
  1. Ability to validate forensic hardware, software, examination procedures.
  2. Email headers understanding.
  3. Ability to generate and validate forensically sterile media.
  4. Ability to generate and validate a forensic image of media.
  5. Understand hashing and hash sets.
  6. Understand file headers.
  7. Ability to extract file metadata from common file types.
  8. Understanding of file fragmentation.
  9. Ability to extract component files from compound files.
  10. Knowledge of encrypted files and strategies for recovery.
  11. Knowledge of Internet browser artifacts.
  12. Knowledge of search strategies for examining electronic
  • Windows Artifacts
  1. Understanding the purpose and structure of component files that create the windows registry.
  2. Identify and capability to extract the relevant data from the dead registry.
  3. Understand the importance of restore points and volume shadow copy services.
  4. Knowledge of the locations of common Windows artifacts.
  5. Ability to analyze recycle bin.
  6. Ability to analyze link files.
  7. Analyzing of logs
  8. Extract and view windows logs
  9. Ability to locate, mount and examine VHD files.
  10. Understand the Windows swap and hibernation files.
  • Report Writing (Presentation of findings)
  1. Ability to conclude things strongly based on examination observations.
  2. Able to report findings using industry standard technically accurate terminologies.
  3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
  4. Be able to consider legal boundaries when undertaking a forensic examination