Course Overview:

TechNow’s Course provides existing .NET developers with practical information and labs that enables them to build solutions on the Microsoft SharePoint 2010/2013 platform.

Attendees to MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010/2013 will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Introduction to SharePoint 2010/2013 Development Platform
  • Using SharePoint 2010/2013 Developer Tools
  • Developing SharePoint 2010/2013 Web Parts
  • Working with SharePoint Objects on the Server
  • Creating Event Receivers and Application Settings
  • Developing Solutions by Using Business Connectivity Services
  • Developing SharePoint 2010/2013 Workflows
  • Working with Client-based APIs for SharePoint 2010/2013
  • Developing Interactive User Interfaces
  • Developing Silverlight Applications for SharePoint
  • Developing Sandboxed Solutions
  • Working with SharePoint Server Profiles and Taxonomy APIs
  • Developing Content Management Solutions

    Prerequisites:

    • An understanding of the problem-solving techniques that apply to software development
    • Approximately 12 months experience with ASP .NET 3.5 with Visual Studio 2008 (or later)
    • Approximately 1 month development experience with SharePoint 2007 or SharePoint 2010/2013 and VS2010/2013 (includes beta releases) creating code that interacts with the SharePoint Sever-side APIs
    • Experience performing end user tasks with SharePoint 2007 or SharePoint 2010/2013 and an understanding of the purpose and use of the following:
      • Lists
      • Documents and Libraries
      • Personalizing an SP Page/Site
      • Using MySites
      • Using SharePoint Designer

    Comments

    Latest comments from students


    User: kelleyd10

    Instructor comments: Clay was / is an outstanding instructor. He was very flexible in what the class needed. He was very accommodating and resourceful in answering the class questions. Clay's teaching style is greatly appreciated.

    Facilities comments: Were good


    User: dennij

    Instructor comments: Very professional and knowledgeable. Available before and after class.

    Facilities comments: Location was nice but too far from Lackland.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).

    Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.

    Date/Location:

    No Events

    Duration: 5 days

    Course Objectives:

    • Designing a Logical Architecture
    • Planning Service Application Architecture
    • Planning for Performance and Capacity
    • Designing a Physical Architecture
    • Designing a Security Plan
    • Planning Authentication
    • Planning Managed Metadata
    • Planning Social Computing
    • Designing Enterprise Search Strategy
    • Planning Enterprise Content Management
    • Developing a Plan for Governance
    • Designing a Maintenance and Monitoring Plan

    Prerequisites:

    • At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
    • At least one year’s experience of mapping business requirements to logical and physical technical design
    • Working knowledge of network design, including network security

    Comments

    Latest comments from students


     

    Liked the class?  Then let others know!

    Course Overview:

    This course is developed for those individuals seeking to pass the Project Management Institute’s PMP certification exam, as well as any individual who has attended any Project Management Certification program in the past and needs to brush up on the material needed to pass the PMP exam.

    Attendees to PM-325: Project Management Professional (PMP) Exam Preparation will receive official PMI (Project Management Institute) course materials and expert instruction from an official PMI Instructor.

    TechNow Inc. is an official Authorized Training Partner of The Project Management Institute (PMI).

     

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Project Initiation
    • Examining the Project Management Framework
    • Examining the Project Management Processes
    • Implementing Project Integration Management
    • Managing the Project Scope
    • Introducing Project Time Management
    • Introducing Project Cost Management
    • Introducing Project Quality Management
    • Introducing Project Human Resource Management
    • Introducing Project Communications Management
    • Introducing Project Risk Management
    • Introducing Project Procurement Management
    • PMP Code of Professional Conduct

    Prerequisites:

    A Bachelor’s degree & 4,500 hours of project management experience over 3 years/36 months.

    OR

    7,500 hours of project management experience over 5 years/60 months (if NO degree).

    AND

    Complete & submit the PMP certification application directly to PMI

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview:
    This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

    Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Manage Identity
    • Plan Desktop and Device Deployment
    • Plan and Implement a Microsoft 365 Solution
    • Configure Networking
    • Configure Storage
    • Manage Data Access and Protection
    • Manage Remote Access
    • Manage Apps
    • Manage Updates and Recovery

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    PowerShell is made for Security Operations (SecOps) automation on Windows. SecOps requires automation in order to scale out security changes and monitoring beyond a handful of hosts. For example, when a vulnerability must be remediated but there is no patch for it yet, automation is needed to quickly and consistently enact the changes necessary. PowerShell “remoting” is encrypted remote command execution of PowerShell scripts in a way that can scale to thousands of endpoints and servers.

    Imagine being able to hunt for indicators of compromise across thousands of machines with just a few lines of PowerShell code. Or imagine having the local Administrator account password reset every night on thousands of endpoints in a secure way, and being able to retrieve that password securely too.

    We will show you to do these tasks and more. Transcription logging for forensics, strong encryption code signing, application whitelisting of scripts, IPSec port control, and Just Enough Admin (JEA).

    As more and more of our systems are moved up to the cloud, PowerShell will become even more important. Amazon Web Services, Microsoft Azure, Office 365, Hyper-V and VMware already support PowerShell administration for many tasks.

    Attendees to TN-963: Windows Security Automation with PowerShell will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 3 days

    Course Objectives:

    Day One
    PowerShell Overview and Tips

      • Getting started running commands
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.
      • Customizing your profile script

    What Can We Do With PowerShell

      • PowerShell remote command execution
      • Fan-out remoting and security
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Searching remote event logs faster with XPath
      • Mounting the registry as a drive
      • Exporting data to CSV, HTML and JSON files
      • Parsing and mining nmap port scanner XML output
      • Running scripts as scheduled jobs
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

    Write your own scripts

      • Writing your own functions
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, do-while, foreach, switch
      • The .NET Framework class library: a playground
      • How to pipe data in/out of your scripts

    Day Two
    Continuous Secure Configuration Enforcement

      • How to use Group Policy and PowerShell together
      • Automate with INF security templates
      • How to customize INF templates
      • Microsoft Security Compliance Manager (SCM)
      • SECEDIT.EXE scripting
      • Building an in-house security repository for SecOps/DevOps
      • NSA’s Secure Host Baseline GPOs

    Group Policy Precision Targeting

      • Managing Group Policy Objects (GPOs) with PowerShell
      • LSDOU, Block Inheritance, Enforced GPOs
      • Group Policy permissions for targeting changes
      • ADMX templates for mass registry editing
      • Deploying PowerShell startup and logon scripts
      • WMI item-level targeting of GPO preferences
      • GPO scheduled tasks to run PowerShell scripts
      • Remote command execution via GPO (not remoting)
      • Empowering the Hunt Team to fight back!

    Server Hardening for SecOps/DevOps

      • Server Manager scripting with PowerShell
      • Adding and removing roles and feature
      • Remotely inventory roles, features, and apps
      • Why Server Nano or Server Core
      • Running PowerShell automatically after service failure
      • Service account identities, passwords, and risks
      • Tools to reset service account passwords securely

    Day Three
    PowerShell Desired State Configuration (DSC)

      • DSC is Configuration Management built in for free
      • Using DSC for continuous reinforcement of settings
      • Writing your own DSC configuration scripts
      • Free DSC resource modules: www.PowerShellGallery.com
      • How to push DSC configurations to many targets
      • DSC background job processing in push mode
      • Examples: sync files, install roles, manage groups
      • Auditing a remote target against a DSC MOF template
      • “ApplyAndAutoCorrect” mode for continuous enforcement

    PowerShell Just Enough Admin (JEA)

      • JEA is Windows sudo, like on Linux
      • JEA is Windows setuid root, like on Linux
      • Restricting commands and arguments
      • Verbose transcription logging
      • How to set up and configure JEA
      • Privilege Access Workstations (PAWs)

    PowerShell and WMI

      • Windows Management Instrumentation (WMI) service
      • What is WMI and why do hackers abuse it so much?
      • Using PowerShell to query WMI CIM classes
      • WMI authentication and traffic encryption
      • Inventory operating system versions and installed software
      • WMI remote command execution versus PowerShell remoting
      • PowerShell security best practices
      • PowerShell transcription logging to catch hackers

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!