A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
EC-Council official E-Courseware
EC-Council official Certificate of Attendance
EC-Council iLabs with access for 6 months
EC-Council CPENT Range access
CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
Module 01. Introduction to Penetration Testing
Module 02. Penetration Testing Scoping and Engagement
TechNow’s Course ensures that you are ready to test for the CCNA Certification. This intensive ten-day program is a high end, hands-on, bootcamp using physical routers & switches in classroom. Students will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. Additionally the course stress tests the students on exam practices that insure the student a successful outcome on the 200-301 CCNA exam.
This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability.
Attendees to N-310: CCNA Extended Bootcamp will receive TechNow approved course materials and expert instruction.
Date/Locations:
This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability. (210) 733-1093
No Events
Duration: 10 days
Course Objectives:
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco Internetwork Operating Systems (IOS) software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP Transport layer and Application layer
Explore functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic WAN and VPN concepts
Describe the operation of Access Control Lists (ACLs) and their applications in the network
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concept
Describe network and device architectures and introduce virtualization
Introduce the concept of network programmability and Software-Defined Networking (SDN)
Configure basic IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Lab Objectives:
Get started with Cisco Command-Line Interface (CLI)
Observe How a Switch Operates
Perform Basic Switch Configuration
Implement the Initial Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Implement an Initial Router Configuration
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure Iv6 Static Routes
Implement IPv4 Static Routing
Implement IPv6 Static Routing
Configure VLAN and Trunk
Troubleshoot VLANs and Trunk
Configure a Router on a Stick
Implement Multiple VLANs and Basic Routing Between the VLANs
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Improve Redundant Switched Topologies with EtherChannel
Configure and Verify IPv4 ACLs
Implement Numbered and Named IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and Port Address Translation (PAT)
Implement PAT
Log into the WLC
Monitor the WLC
Configure a Dynamic (VLAN) Interface
Configure a DHCP Scope
Configure a WLAN
Define a Remote Access Dial-In User Service (RADIUS) Server
Explore Management Options
Explore the Cisco DNA Center
Configure and Verify NTP
Configure System Message Logging
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Secure Device Administrative Access
Configure and Verify Port Security
Implement Device Hardening
Prerequisites:
Familiarity in the following networking topics:
TCP/IP
IP Configuration
Peer-to-Peer Networking
Subnetting
Building a Routing Table
It is not required but highly recommended to have the following certifications:
Instructor comments: The instructor Mr. Tom Bigger has done a terrific job of substantiating the textbook content with hands on labs. He has been patient and ensure that we understood the material
User: MikeWisn
Instructor comments: Did exceptional job explaining complicated concepts.
Facilities comments: Hotel front desk phone ringing loudly during class was distracting.
AWS System Operations begins with a one day introduction to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.
The AWS course continues to flow with teaching those in a Systems Administrator or Developer Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
To continue to learn more about AWS, TechNow has the following course:
Attendees to CL-415: AWS System Operations will receive TechNow approved course materials and expert instruction.
Duration: 5 Days
Audience:
This course is intended for:
• System Administrators
• Software Developers, especially those in a Developer Operations (DevOps) role
DoD 8140: Not Mandated
Course Prerequisites:
We recommend that attendees of this course have the following prerequisites:
• Background in either software development or systems administration
• Some experience with maintaining operating systems at the command line (shell scripting in Linux environments, cmd or PowerShell in Windows)
• Basic knowledge of networking protocols (TCP/IP, HTTP)
Course Objectives:
This course is designed to teach you how to:
• Understand basic data center design concepts.
• Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console.
• Understand the foundational infrastructure services, including Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Amazon Elastic Block Store (EBS), Amazon Simple Storage Service (S3), Auto Scaling, and Elastic Load Balancing (ELB).
• Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM).
• Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS).
• Understand AWS management tools, including Amazon CloudWatch and AWS Trusted Advisor.
• Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
• Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
• Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
• Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
• Monitor the health of Amazon EC2 instances and other AWS services
• Manage user identity, AWS permissions, and security in the cloud
• Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
• Select and implement the best strategy for creating reusable Amazon EC2 instances
• Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
• Edit and troubleshoot a basic AWS CloudFormation stack definition
Dates/Locations:
No Events
Course Outline:
Day 1
• Introduction and History of AWS
• AWS Infrastructure: Compute, Storage, and Networking
• AWS Security, Identity, and Access Management
• AWS Databases
• AWS Management Tools
Day 2
• System Operations on AWS Overview
• Networking in the Cloud
• Computing in the Cloud Day 3
• Storage and Archiving in the Cloud
• Monitoring in the Cloud
• Managing Resource Consumption in the Cloud Day 4
• Configuration Management in the Cloud
• Creating Scalable Deployments in the Cloud
• Creating Automated and Repeatable Deployments Day 5 Full Day Lab
• Select the appropriate AWS service based on compute, data, or security requirements
• Execute steps required to provision cloud resources for selected deployment
• Identify and implement data protection, encryption, and capacity planning
• Implement and manage security policies, access controls, and role
• Implement Automation
In this course students will learn to configure the Linux kernel, install & configure modules, to install and configure non-default devices and automate installation with Kickstart. Students also utilize skills developed in L-245 to expand on file system configuration with spanning devices and RAID. This is the foremost server side Linux course in the industry covering all server side components such as DHCP, Samba, NIS, LDAP, inet, telnet ftp, dns, etc. Expanding on security introduced in L-245: Linux System Administration I, TCP wrappers, firewalling with IP filters, SQUID, & ssh are covered.
Attendees to L-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
Custom installation of a Linux server
Linux device naming conventions & the boot process
Adding peripheral devices
Reconfiguring the kernel
Disk partitioning & formatting
Changing system run levels
Adding startup files for additional services
Adding & removing software packages
Disk & file system Administration
Terminals & modem configuration
Configuring NFS to support the client/server environment
Use the automounter
Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Troubleshooting techniques
Advanced Linux installation
Prerequisites:
L-245: Linux System Administration I plus six months experience as a systems administrator or one year or more of administrating the Linux operating system.
TN-575: Open Source Network Security Monitoring teaches students how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. No network is bullet proof and when attackers access your network, this course will show you how to build a security net to detect, contain, and control the attacker. Sensitive data can be monitored and deep packet and deep attachment analysis can be achieved. As organizations stand up a Security Operations Center (SOC) the enterprise NSM is the key ingredient to that SOC. This course not only teaches how to implement an NSM technologically, but how to effectively monitor an enterprise operationally. You will learn how to architect an NSM solution: where to deploy your NSM platforms and how to size them, stand-alone or distributed, and integration into packet analysis, interpret evidence, and integrate threat intelligence from external sources to identify sophisticated attackers. A properly implemented NSM is integral to incident response and provides the responders timely information to react to the incident. TN-575: Open Source Network Security Monitoring is a lab intensive environment with a cyber range that gives each student in-depth knowledge and practical experience monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls.
Attendees to TN-575: Open Source Network Security Monitoring class will receive TechNow approved course materials and expert instruction.
This Course is taught utilizing Security Onion or RockNSM as specified by the customer.
Dates/Locations:
No Events
Duration: 5 Days
Course Objective:
The focus of this course is to present a suite of Open Source security products integrated into a highly functional and scalable Network Security Monitoring solution.
Prerequisites:
Students should have a basic understanding of networks, TCP/IP and standard protocols such as DNS, HTTP, etc. Some Linux knowledge/experience is recommended, but not required
Course Outline:
Network Security Monitoring (NSM) Methodology
High Bandwidth Packet Capture Challenges
Installation of Security Onion
Use Cases (analysis, lab, stand-alone, distributed)
Resource Requirements
Configuration
Setup Phase I – Network Configuration
Setup Phase 2 – Service Configuration
Evaluation Mode vs. Configuration Mode
Verifying Services
Security Onion Architecture
Configuration Files and Folders
Network Interfaces
Docker Environment
Security Onion Containers
Overview of Security Onion Analyst Tools
Kibana
CapME
CyberChef
Squert
Sguil
NetworkMiner
Quick Review of Wireshark and Packet Analysis
Display and Capture Filters
Analyze and Statistics Menu Options
Analysis for Signatures
Analyzing Alerts
Replaying Traffic
3 Primary Interfaces:
Squert
Sguil
Kibana
Pivoting Between Interfaces
Pivoting to Full Packet Capture
Snort and Surricata
Rule Syntax and Construction
Implementing Custom Rules
Implementing Whitelists and Blacklists
Hunting
Using Kibana to Slice and Dice Logs
Hunting Workflow with Kibana
Bro
Introduction and Overview
Architecture, Commands
Understanding and Examining Bro Logs
Using AWK, sort, uniq, and bro-cut
Working with traces/PCAPs
Bro Scripts Overview
Loading and Using Scripts
Bro Frameworks Overview
Bro File Analysis Framework FAF
Using Bro scripts to carve out more than files
RockNSM ( * If Applicable)
Kafka
Installation and Configuration
Kafka Messaging
Brokers
Integration with Bro and FSF
File Scanning Framework FSF
Custom YARA Signatures
JSON Trees
Sub-Object Recursion
Bro and Suricata Integration
Elastic Stack
Adding new data sources in Logstash
Enriching data with Logstash
Automating with Elastalert
Building new Kibana dashboards
Production Deployment
Advanced Setup
Master vs Sensor
Node Types – Master, Forward, Heavy, Storage
Command Line Setup with sosetup.conf
Architectural Recommendations
Sensor Placement
Hardening
Administration
Maintenance
Tuning
Using PulledPork to Disable Rules
BPF’s to Filter Traffic
Spinning up Additional Snort / Suricata / Bro Workers to Handle Higher Traffic Loads