- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)

Course Overview:
This bootcamp is a customized course for Cloud Essentials+ and Cloud+ that leverages 8 days to provide greater value than just the delivery of two separate courses. The 8 days of instruction prepare the student for the CCSP course.
TechNow has Identified overlap and uses time saved to:
- Introduce hands-on skills (Open Source and AWS)
- Go more in-depth on theory using hands-on to reinforce concepts
- Do exam prep with practice questions
This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.
This bootcamp helps prepare students for 2 certifications, CompTIA Clouds Essentials+ and CompTIA Cloud+. After this course students will also be prepared to continue their education by taking CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar .
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ and CompTIA Cloud+ curriculum.
Attendees to CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 8 days
Course Objectives:
- Learn the fundamental concepts of cloud computing
- Learn the business aspects and impacts of cloud computing
- Differentiate the types of cloud solutions and the adoptions measures for each
- Identify the technical challenges and the mitigation measures involved in cloud computing
- Identify the technical challenges and the mitigation measures involved in cloud computing
- Identify the steps to successfully adopt cloud services
- Identify the basic concepts of ITIL and describe how the ITIL framework is useful in the implementation of cloud computing in an organization
- Identify the possible risks involved in cloud computing and the risk mitigation measures, and you will also identify the potential cost considerations for the implementation of cloud and its strategic benefits
- Prepare to deploy cloud solutions
- Deploy a pilot project
- Test a pilot project deployment
- Design a secure network for cloud deployment
- Determine CPU and memory sizing for cloud deployments
- Plan Identity and Access Management for cloud deployments
- Analyze workload characteristics to ensure successful migration to the cloud
- Secure systems to meet access requirements
- Maintain cloud systems
- Implement backup, restore, and business continuity measures
- Analyze cloud systems for required performance
- Analyze cloud systems for anomalies and growth forecasting
- Troubleshoot deployment, capacity, automation, and orchestration issues
- Troubleshoot connectivity issues
- Troubleshoot security issues
Course Prerequisites:
- Security+, Network+ or equivalent experience
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.
Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Systems Security Engineering
- Certification and Accreditation
- Technical Management
- U.S. Government Information Assurance Governance
Prerequisites:
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone know?
Course Overview:
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
- Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
- Linux File, Directory, and Permissions Management
- Linux archives using tar and zip
- Interacting with BASH
- Review of Common Linux commands
- Sorting files by line or field
- Regular Expressions (meta character) with grep commands to locate specific lines in files
- Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
- Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
- Miscellaneous commands Tr, sort, cut, past, pr -Lab
- Performing non-interactive editing tasks with the sed command
- Writing simple sed scripts to perform complex editing tasks
- Using awk variables & arrays to sort data
- Employing awk programs to manipulate numeric & textual data
- Performing formatted printing in awk
- Writing simple awk programs to write reports from data files
- Using built-in awk functions & defining new functions
- Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
- Shell Review
- Shell Interpretation of Quotes & Backslash
- The Bash Shell
- Shell's combined with UNIX utilities
- Programming Basics
- Data Constructs
- Programming Looping
- Your Environment
- More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
- System Configuration / Kernel overview
- System Maintenance / Disk and file admin
- Using utilities for process control, locating files & automating maintenance tasks
- System Startup / Boot Process – LILO & GRUB Configuration
- Managing the Linux file system
- Customization of setup files
- Run Levels
- Network Services / Configuration
- User Management Monitoring, accessing & restricting root system access
- Administration Tools
- Process Control
- Client side components of NFS, Samba, NTP, NIS
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
- Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Facilities comments: Facility was fine
Liked the class? Then let everyone know!
Course Overview:
TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI. This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .
TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams. Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI. As with many advanced TechNow security courses, there is a large hands-on ratio. This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries. CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.
This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. . MDT puts us close the mission and helps define the internal context to be analyzed against the CTI. TechNow pushes the student to truly understand how to think about and use CTI to make a difference.
Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Learn to comprehend and develop complex scenarios
- Identify and create intelligence requirements through practices such as threat modeling
- Utilize threat modeling to drive intelligence handling and practices
- Breakdown tactical, operational, and strategic-level threat intelligence
- Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
- How to collect adversary information creating better value CTI
- How to filter and qualify external sources, mitigating low integrity intelligence
- Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
- Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
- Breaking down threats mapped against their tradecraft to tweak IOCs
- Establish structured analytical techniques to be successful in any security role
- Learn and apply structured principles in support of CTI and how to communicate that to any security role.
Course Prerequisites:
- Security+, or equivalent experience
Comments
Latest comments from students