Course Overview:

The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances, and maintaining an enterprise deployment of OpenStack. This course also teaches the management and customization of an enterprise deployment of OpenStack (overcloud) and how to manage compute nodes with Red Hat OpenStack Platform director (undercloud).

Attendees to CL-345: Red Hat OpenStack Administration II will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Prerequisites:

This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.

Prerequisites for this course is Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent experience.

Attend Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL115), or demonstrate equivalent experience

Course Outline:

  • Navigate the Red Hat OpenStack Platform architecture
  • Describe the OpenStack control plane
  • Integrate Identity Management
  • Perform image operations
  • Manage storage
  • Manage OpenStack networking
  • Manage compute resources
  • Automate could applications
  • Troubleshoot OpenStack operations
  • Comprehensive review

 

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:

TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Learn to comprehend and develop complex scenarios
  • Identify and create intelligence requirements through practices such as threat modeling
  • Utilize threat modeling to drive intelligence handling and practices 
  • Breakdown tactical, operational, and strategic-level threat intelligence
  • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
  • How to collect adversary information creating better value CTI
  • How to filter and qualify external sources, mitigating low integrity intelligence
  • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
  • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
  • Breaking down threats mapped against their tradecraft to tweak IOCs
  • Establish structured analytical techniques to be successful in any security role
  • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

Course Prerequisites:

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:

Windows Forensic Analysis is a hands-on course that covers digital forensics of the Microsoft Windows operating system.  The collection and analysis of data tracking user based activity that can be used for internal purposes or legal litigation.  TechNow has the student analyze many data images for various Windows operating systems, as current as Windows 8.1, Windows 10  in an environment that uses many Cloud technologies such as  Office365, Skydrive, Sharepoint, Exchange Online, and Windows Phone.

This is not death by power point. The course is aligned with digital forensic investigators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Windows Forensic Analysis.

Attendees to TN-909: Windows Forensic Analysis will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Windows Operating System Components
  • Core Forensic Principles
  • Live Response and Triage-Based Acquisition Techniques
  • Windows Image Mounting and Examination
  • Memory, Pagefile, Filesystems
  • Data and Metadata
  • Profiling systems and users
  • Tracking USB and BYOD
  • Log and Registry Analysis
  • User Communications
  • Email Forensics
  • Browser Forensics
  • Reporting and  Presentation

Course Prerequisites:

  • Windows and Security Experience

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

 

TechNow offers many courses that also have a related certification exam.  As an Authorized Peason VUE testing center, we offer exams for many certifications.  Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.

in   

 

Course Overview: Clear and detailed discussion on the following course content:

  • What is the Agile Adaptive  Methodology versus the Predictive (waterfall) Methodology?
  • The Agile Value Proposition, by explanation of the Agile Manifesto and Agile Principles.
  • What is the Scrum Framework by explanation of Scrum Roles, Ceremonies and Artifacts?
  • What are the artifacts of Product Planning, Release Planning and Sprint Planning?
  • What are the Agile impacts to corporate team structures and stakeholder alignment?
  • What are Agile myths and why an Agile transformation will fail?
  • What are Agile (hybrid) tailoring considerations?


Attendees to PM-221: Agile Overview for Executives and Leaderswill receive TechNow approved course materials and expert instruction.

 

Dates/Locations:

No Events

Duration: 1 Days

Course Objectives: Are you and executive or leader in your organization and interested in learning about Agile principles? This course details the Agile framework that uses an adaptive life cycle, specifically related to using the Scrum approach.

Upon successful completion of this course, students will be able to:

  • Understand an overview of the main aspects that leadership must know to implement strategic opportunities with Agile principles for product quality and on-time product delivery
  • Participants will dive into understanding the strategic and tactical elements of implementing Agile and Scrum into their organization
  • Receive details on how to understand the organizational impact that the Agile transformation could have on the different aspects of your current business processes

Target Student:

  • Designed specifically for leaders and senior managers or anyone wanting to understand the high-level basics of the Agile Framework

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!