Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC). The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.
Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Active Directory and BloodHound
- Security Controls
- PKI
- Encryption
- Wireless & Network Security and Hardening DNS
- 802.1x and Endpoint Protection
- Firewalls and VPN
- PowerShell Scripting
- JEA, DSC, Enterprise Security with PowerShell
- Windows Attack Strategies
Prerequisites:
- Security+
- Windows System Administration Skills
Comments
Latest comments from students
User: bbrabender
Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.
Facilities comments: N/A
User: dale.r.anderson
Instructor comments: Instructor was well knowlegeable accross alot of domains.
Facilities comments: Pretty good
Liked the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
TechNow has been involved in enterprise security architectures and education since 1990. TechNow’s training program has followed the evolution of enterprise computing into security architectures. Palo Alto Networks represents the current state of security product evolution. With next generation firewall technology, the reunification of your security architecture is possible. TechNow can present the ramifications of many centralized strategies. All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
Palo Alto Networks Certifications: Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take EDU-201 + EDU-205 + EDU-221
TechNow is a mobile Pearson VUE Authorized Testing Center. Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course. Take the course and get certfied, without logistical effort of getting students to a training facility and the hassle of scheduling testing.
TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
Course Overview:
A skills focus enables the student to better absorb the subject matter and perform successfully on the exam. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness. Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.
Attendees to TN-939: Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 9 days
Course Objectives:
- Backdoors & Trojan Horses
- Buffer Overflows
- Covering Tracks: Networks
- Covering Tracks: Systems
- Denial of Service Attacks
- Exploiting Systems Using Netcat
- Format String Attacks
- Incident Handling Overview and Preparation
- Incident Handling Phase 2: Identification
- Incident Handling Phase 3: Containment
- Incident Handling: Recovering and Improving Capabilities
- IP Address Spoofing
- Network Sniffing
- Password Attacks
- Reconnaissance
- Rootkits
- Scanning: Host Discovery
- Scanning: Network and Application Vulnerability scanning and tools
- Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
- Scanning: Service Discovery
- Session Hijacking, Tools and Defenses
- Types of Incidents
- Virtual Machine Attacks
- Web Application Attacks
- Worms, Bots & Bot-Nets
Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: m_jurrens
Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.
User: natebonds
Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.
Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.
Liked the class? Then let everyone know!