Course Overview:

Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC²)®’s seven domains.

Attendees to TN-715: Systems Security Certified Practitioner (SSCP) will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Access Controls
  • Security Operations and Administration
  • Analysis and Monitoring
  • Cryptography
  • Networks and Telecommunications
  • Malicious Code/Malware
  • Risk, Response, and Recovery

Prerequisites:

  • One year security experience
  • Some knowledge of the (ISC²)®’s seven domains

Comments

Latest comments from students


User: boyleb15

Instructor comments: Instructor was very knowledgeable on most items covered during this course. There were some topics he did lack the answer to. Instructor would also get sidetracked easily


User: keginth

Instructor comments: he was phenomenal with test prep and knew the book well

Facilities comments: adequate


Like the class?  Then let everyone know!

Course Overview:

This course, TN-385: TCP/IP Analysis & Implementation, provides students with a comprehensive technical introduction to TCP/IP & the interworkings of TCP/IP application to UNIX, Linux and Windows in a network environment.  This course begins by providing a comprehensive protocol stack analysis.  It continues with extensive hands-on exercises needed to configure TCP/IP on UNIX and Windows based networks.

Attendees to TN-385: TCP/IP Analysis & Implementation will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • A thorough comprehension of each level of the protocol stack
  • Configuring UNIX & Windows to access internetworks
  • Configuring & setting up a Cisco router
  • Properly implementing subnets to avoid ongoing maintenance headaches
  • Routing & routing protocols, RIP, OSPF, and IGRP
  • How to troubleshoot a wide range of routing problems
  • All major TCP/IP application services including: FTP, TELNET, SNMP, NFS, DNS, DHCP, & WINS
  • How to avoid common internetworking problems
  • How to troubleshoot TCP/IP networks using protocol analysis techniques – snoop on Sun Workstation & Network Monitor on Windows.
  • How to design, build, configure, & manage TCP/IP internetworks
  • Applying a structured methodology for troubleshooting TCP/IP internetworks
  • ACL's on Cisco routers

Prerequisites:

  • Students should have good end-user skills in TCP/IP (FTP, TELNET, RLOGON,  & MAIL).

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Here are our Linux course offerings:

    in   

    Course Overview:

    This course is designed for students who intend to work with virtual private networks (VPNs) using IPSec. The course includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. This class is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients.

    Attendees to N-315: Cisco Secure Virtual Private Networks will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Network Security & Virtual Private Network Technologies Cisco VPN 3000 Concentrator Series Hardware Overview
    • Routing on the VPN 3000
    • Configuring the Cisco VPN 3000 for Remote Access Using Pre-shared Keys
    • Configuring the Cisco VPN 3000 for Remote Access Using Digital Certificates
    • The Cisco VPN Client Firewall Feature
    • Configuring the Cisco 3002 Hardware Client for Remote Access
    • Configuring the Cisco 3002 Hardware Client for User & Unit Authentication
    • Configuring Cisco VPN Clients for Backup Server, Load Balancing & Reverse Route Injection
    • Configuring the Cisco 3000 Concentrator for IPSec over TCP & UDP
    • Configuring LAN-to-LAN VPNs on the Cisco 3000
    • Network Monitoring & Administration Troubleshooting

    Prerequisites:

    • Students who attend this advanced course must have experience in configuring Cisco IOS software
    • CCNA certification
    • Basic knowledge of the Windows operations system
    • Familiarity with the networking & security terms & concepts

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

    Duration: 5 Days

    Audience:

    Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisite:
    • Network+

    Dates/Locations:

    No Events

    Course Outline:

    DAY ONE

    Course Set Up and Analyzer Testing

    Network Analysis Overview
    Wireshark Functionality Overview
    Capturing Wired and Wireless Traffic
    Define Global and Personal Preferences for Faster Analysis
    Defined Time Values and Interpret Summaries
    Interpret Basic Trace File Statistics to Identify Trends
    Create and Apply Display Filters for Efficient Analysis

    DAY TWO

    Follow Streams and Reassemble Data
    Use Wireshark’s Expert System to Identify Anomalies
    TCP/IP Analysis Overview
    Analyze Common TCP/IP Traffic Patterns

    DAY THREE

    Graph I/O Rates and TCP Trends
    802.11 (WLAN) Analysis Fundamentals
    Voice over IP (VoIP) Analysis Fundamentals
    Network Forensics Fundamentals

    DAY FOUR

    Detect Scanning and Discovery Processes
    Analyze Suspect Traffic

    DAY FIVE

    Use Command‐Line Tools

    Next/Related Courses: