Course Overview:
In this course, the students will implement various data platform technologies into solutions that are in-line with business and technical requirements, including on-premises, cloud, and hybrid data scenarios incorporating both relational and NoSQL data. They will also learn how to process data using a range of technologies and languages for both streaming and batch data.
The students will also explore how to implement data security, including authentication, authorization, data policies, and standards. They will also define and implement data solution monitoring for both the data storage and data processing activities. Finally, they will manage and troubleshoot Azure data solutions which includes the optimization and disaster recovery of big data, batch processing, and streaming data solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to DP-200: Implementing an Azure Data Solution will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 4 days
Course Outline:
- Azure for the Data Engineer
- Working with Data Storage
- Enabling Team Based Data Science with Azure Databricks
- Building Globally Distributed Databases with Cosmos DB
- Working with Relational Data Stores in the Cloud
- Performing Real-Time Analytics with Stream Analytics
- Orchestrating Data Movement with Azure Data Factory
- Securing Azure Data Platforms
- Monitoring and Troubleshooting Data Storage and Processing
Prerequisites :
-
-
- In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses:
- AZ-900: Microsoft Azure Fundamentals
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances, and maintaining an enterprise deployment of OpenStack. This course also teaches the management and customization of an enterprise deployment of OpenStack (overcloud) and how to manage compute nodes with Red Hat OpenStack Platform director (undercloud).
Attendees to CL-345: Red Hat OpenStack Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.
Prerequisites for this course is Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent experience.
Attend Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL115), or demonstrate equivalent experience
Course Outline:
- Navigate the Red Hat OpenStack Platform architecture
- Describe the OpenStack control plane
- Integrate Identity Management
- Perform image operations
- Manage storage
- Manage OpenStack networking
- Manage compute resources
- Automate could applications
- Troubleshoot OpenStack operations
- Comprehensive review
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course gives students the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues. This course includes material contained in Microsoft’s 6424, 6425, 6426 and is an aid to preparation for the 70-640 exam.
Attendees to TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Installation
- Administration
- Users
- Groups
- Computers
- Group Policy Infrastructure
- Group Policy Settings
- Domains and Forests
Prerequisites:
- Basic understanding of networking
- Intermediate understanding of network operating system
- An awareness of security best practices
- Basic knowledge of server hardware
- A+ or equivalent knowledge
- Some experience creating objects in Active Directory
- Basic concepts of backup and recovery in a Windows Server Environment
Comments
Latest comments from students