Here are the General Unix course offerings:
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
- Getting started running commands
- Security cmdlets
- Using and updating the built-in help
- Execution policies
- Fun tricks with the ISE graphical editor
- Piping .NET and COM objects, not text
- Using properties and methods of objects
- Helping Linux admins feel more at home
- Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
- Customizing your profile script
- PowerShell remote command execution
- Security setting across the network
- File copy via PowerShell remoting
- Capturing the output of commands
- Parsing text files and logs with regex patterns
- Parsing Security Logs
- Searching remote event logs
- Mounting the registry as a drive
- Security settings in the Registry
- Exporting data to CSV, HTML and JSON files
- Running scripts as scheduled jobs
- Continued Security Compliance
- Pushing out scripts through Group Policy
- Importing modules and dot-sourcing functions
- http://www.PowerShellGallery.com
PowerShell Scripting
- PowerShell Scripting to implement Security Practices
- Writing your own functions to automate security status and settings
- Passing arguments into your scripts
- Function parameters and returning output
- Flow control: if-then, foreach, that make security decisions
- How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]
Course Overview:
In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.
Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Planning Routing Services to Requirements
- Implementing an EIGRP-Based Solution
- Implementing a Scalable Multiarea Network
- OSPF-Based Solution
- Implement an IPv4- Based Redistribution Solution
- Implementing Path Control Connection of an Enterprise Network to an ISP Network
Prerequisites:
- None
Comments
Latest comments from students
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Awesome
Liked the class? Then let everyone know!
Course Overview:
This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field. Assessors and Auditors have to face many technologies that are not part of the main stream. TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures. Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system. Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.
Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF. TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements. TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security. Cross Domain overlays are presented that fits the work flow of an assesor. PII overlays and any overlays that an organization uses and can be made available are also presented.
This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503. Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance. ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program. TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency. TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.
More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively. The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies. Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).
TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.
A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls. Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered. This course is not theory or death by power point. Real scenarios are presented as exercises. A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.
Date/Locations:
Duration: 5 days
Course Objectives:
- Establish a baseline of RMF knowledge
- Validate essential security controls, programs, and metrics
- DoD DCD 6/3 to ICD 503 Transition
- Lab Environtment and the Cyber Range
- Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
- Risk Assessment Report (RAR)
- Systems Security Plan (SSP)
- Security Assessment Report (SAR)
- Plans of Action and Milestone (POAM)
Prerequisites:
Experience in the field of auditing and assesments.
Comments
Latest comments from students