Here are our Microsoft Programming courses:
Course Overview:
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies is the big picture overview of a SOC, other courses provide a deep dive into the technologies that a SOC may utilize. This course addresses the internal workings of staff, skills required, required authorizations, internal agreements, and setting appropriate expectation levels of a SOC within budget constraints. A SOC is not a one size fits all, the instructor has decades of security experience and brings to the table opportunities to discuss what can work within constraints. Many organizations are coming to the realization that some level of a SOC is now required and to learn just what decisions need to be made: Out-sourced, In-sourced, budgets, capabilities and many more. Students leave with a worksheet of how to progress when they get back to their organization.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies – Is a course that incorporates lecture, demos, and group exercises for standing up a Security Operations Center (SOC). Students learn strategies and resources required to deploy, build, and run Network Security Monitoring (NSM) and work roles and flows for a SOC. No network is bullet proof and when attackers access your network, this course will show you options and resources to build a security net to detect, contain, and control the attacker. Examples on what it takes to architect an NSM solution to identify sophisticated attackers and a response strategy. Properly implemented detection and response technologies is integral to incident response and provides the responders timely information and tools to react to the incident. Effective demonstrations are given of Open Source technologies that build up a SOC, but any software can be used and demonstrations are provided to demonstrate technology families not push a specific solution.
TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies demonstrations utilize a cyber range that gives each student in-depth knowledge of monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls; and software and services to provide orchestrate Incident Response, Intelligence Analysis, and Hunt Operations.
Attendees to TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 Days
Course Objective:
-
- To provide management an overview of what it takes to stand up a SOC.
Prerequisites:
- Students should have an understanding of the security field.
Course Outline:
- What threats does my organization care about?
- What does a threat look like?
- What does a threat look like?
- How to present the SOC internally.
- Communication with Stakeholders and Executives Leveraging and integrating existing security measures
- People
- Establishing a skill matrix and work roles for SOC members
- Establishing a training path
- Personnel background requirementsProcesses
- Processes
- Alignment to standards: NIST, PCI, HIPAA, etc.
- Risk related decision trees
- Playbooks
- Threat Intelligence Integration
- Technology – Tool Suites to Support:
- Ethical Hacking
- Network Security Monitoring and SIEM
- Forensics
- Dashboards
- Analysis and Hunting
- Incident Management and Ticketing
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment. It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements. The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and 40% lab time.
Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of Business Analysis Workshop
- Eliciting Project Workshop
- Case Study
- Analyzing Requirements and Writing Case Studies
- Case Study
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.
Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- The Current State of the Telecom Industry
- Telecom Service Providers
- Digitalizing Voice
- Communication Mediums and Multiplexing
- Carrier Access: Customer-to-Carrier Connections
- Broadband Access
- Enterprise Networks
- Carrier Transport Services
- Data Communications and Packet-Switched Networks
- Migrating Voice from Circuit-to-Packet-Switched Networks
- Carrier Data Services
- Ethernet Services
- Remote Access Virtual Private Networks (VPNs)
- Video Technology and Services
- Current Mobile Wireless Services
- Fixed Mobile Convergence (FMC)
- Worldwide Interoperability for Microwave Access (WiMax)
- Multimedia Subsystem (IMS)
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview: PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.
Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 days
Course Objectives: Students attending this training course will gain an understanding of cyberthreats and their characteristics. Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.
Day 1
|
Day 2
A |
Prerequisites:
- Students must complete the PA-213: Install, Configure, and Manage course
- Understanding of network concepts, including routing, switching, and IP addressing
- In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students