SecurityX® (formerly known as CASP+)course prepares you for the CompTIA SecurityX®certification exam (CVO-005) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. This course will prepare students for the objectives covered in the CompTIA SecurityX certification exam (CVO-005).
Attendees to CT-425: CompTIA SecurityX will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Support IT governance in the enterprise with an emphasis on managing risk
Leverage collaboration tools and technology to support enterprise security
Use research and analysis to secure the enterprise
Integrate advanced authentication and authorization techniques
Implement cryptographic techniques
Implement security controls for hosts
Implement security controls for mobile devices
Implement network security
Implement security in the systems and software development lifecycle
Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
Conduct security assessments
Respond to and recover from security incidents
Prerequisites:
Completion of the following or equivalent knowledge:
Minimum of 10 years general hands on IT experience
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
Linux File, Directory, and Permissions Management
Linux archives using tar and zip
Interacting with BASH
Review of Common Linux commands
Sorting files by line or field
Regular Expressions (meta character) with grep commands to locate specific lines in files
Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
Performing non-interactive editing tasks with the sed command
Writing simple sed scripts to perform complex editing tasks
Using awk variables & arrays to sort data
Employing awk programs to manipulate numeric & textual data
Performing formatted printing in awk
Writing simple awk programs to write reports from data files
Using built-in awk functions & defining new functions
Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
Day 3 – Intro to Programming / Shell Scripting
Shell Review
Shell Interpretation of Quotes & Backslash
The Bash Shell
Shell's combined with UNIX utilities
Programming Basics
Data Constructs
Programming Looping
Your Environment
More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
System Configuration / Kernel overview
System Maintenance / Disk and file admin
Using utilities for process control, locating files & automating maintenance tasks
System Startup / Boot Process – LILO & GRUB Configuration
Managing the Linux file system
Customization of setup files
Run Levels
Network Services / Configuration
User Management Monitoring, accessing & restricting root system access
Administration Tools
Process Control
Client side components of NFS, Samba, NTP, NIS
Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
Getting started running commands
Security cmdlets
Using and updating the built-in help
Execution policies
Fun tricks with the ISE graphical editor
Piping .NET and COM objects, not text
Using properties and methods of objects
Helping Linux admins feel more at home
Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
Customizing your profile script
PowerShell remote command execution
Security setting across the network
File copy via PowerShell remoting
Capturing the output of commands
Parsing text files and logs with regex patterns
Parsing Security Logs
Searching remote event logs
Mounting the registry as a drive
Security settings in the Registry
Exporting data to CSV, HTML and JSON files
Running scripts as scheduled jobs
Continued Security Compliance
Pushing out scripts through Group Policy
Importing modules and dot-sourcing functions
http://www.PowerShellGallery.com
PowerShell Scripting
PowerShell Scripting to implement Security Practices
Writing your own functions to automate security status and settings
Passing arguments into your scripts
Function parameters and returning output
Flow control: if-then, foreach, that make security decisions
How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]
In this course-currently the only offering in the market devoted to Group Policy training-you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.
Attendees to TN-5455: Managing Windows Environments with Group Policy will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
Features and functions of Group Policy
Use Group Policy management tools to manage security policies
Design a Group Policy infrastructure
Group Policy processing architecture
Back up, restore, import, and copy Group Policy Objects through the Group Policy
Management Console
Use Windows PowerShell to manage Group Policy
Implement security using Group Policy
Configure the desktop environment with Group Policy
Configure roaming profiles and Folder Redirection
Assign and publish software packages
Implement AppLocker and software restriction policies
Create and deploy Administrative Templates
Configure Group Policy preferences
Course Prerequisites:
Experience with the Microsoft Windows Server 2008/12 environments and a fundamental understanding of Active Directory
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:
Note: The Certifications in red are recently added to approved list as of 2/4/19
For further information or to schedule for classes, call us at 800-324-2294