Here are the General Unix course offerings:
Course Overview:
The UNIX Security Administrator Prep is a hands-on course that covers how to secure and audit UNIX and Linux operating systems. This includes concepts such as Rootkits, Buffer overflows, and monitoring UNIX/Linux systems.
Attendees to TN-959: Unix Security Administratorwill receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- AIDE
- Apache
- Best Practices for Kernel Tuning and Warning Banners
- Boot Services
- Chroot()
- DNS- BIND
- DNSSec
- Evidence Collection and Preservation
- Forensic Analysis
- Forensic Preparation and Incident Handling
- Host Based Firewalls – iptables
- Intro to Forensics
- OS Install and Patching
- Physical, User Account, and Password Access Control
- Se Linux
- Sendmail
- SSH
- Stack Smashing
- Sudo
- Syslog-NG
- UNIX Logging
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: wbcarter
Instructor comments: Good Stuff. Thanks!
User: ryuhas
Instructor comments: Very Good Instructor
Facilities comments: Facilities was great. Location had a lot to be desired. To much traffic and accidents trying to get here.
Liked the class? Then let everyone know!
Course Overview:
The C-215: Introduction to C Programming course is a hands-on course providing a complete introduction to the ANSI C programming language, focusing on quickly developing the practical skills needed to create real-world solutions. Our hands-on labs are designed to promote retention and challenge students to apply their skills to new situations.
Attendees to C-215: Introduction to C Programming will receive TechNow approved course materials and expert instruction.
Duration: 5 days
Course Objectives:
- What is C?
- Basics of Program Writing
- Style
- Basic Declarations & Expressions
- Arrays, Qualifiers & Reading Numbers
- Decision & Control Statements
- Programming Process
- More Controls Statements
- Variable Scope & Functions
- C Preprocessor
- Bit Operations
- Advanced Types
- Simple Pointers
- File Input/Output
- Debugging & Optimization
- Floating Point
Prerequisites:
Before attending this course, you should be able to use basic UNIX commands and have previous programming experience language, or have taken our Introduction to Computer Progamming class.
Comments
Latest comments from students
User: jangles1337
Instructor comments: Pretty knowledgeable on a number of things. Could have had a better in depth understanding of the material.
Facilities comments: Was a hotel so it was pretty noisy some times.
User: ldorsey
Instructor comments: Great guy full of knowledge
Liked the class? Then let everyone know!
CCFE Core Competencies
- Procedures and Legal Issues
- Computer Fundamentals
- Partitioning Schemes
- Data Recovery
- Windows File Systems
- Windows Artifacts
- Report writing (Presentation of Finding)
- Procedures and Legal issues
- Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
- Ability to explain the on-scene action taken for evidence preservation.
- Ability to maintain and document an environment consolidating the computer forensics.
- Computer Fundamentals
- Understand BIOS
- Computer hardware
- Understanding of numbering system (Binary, hexadecimal, bits, bytes).
- Knowledge of sectors, clusters, files.
- Understanding of logical and physical files.
- Understanding of logical and physical drives.
- Partitioning schemes
- Identification of current partitioning schemes.
- Understanding of primary and extended partition.
- Knowledge of partitioning schemes and structures and system used by it.
- Knowledge of GUID and its application.
- Windows file system
- Understanding of concepts of files.
- Understanding of FAT tables, root directory, subdirectory along with how they store data.
- Identification, examination, analyzation of NTFS master file table.
- Understanding of $MFT structure and how they store data.
- Understanding of Standard information, Filename, and data attributes.
- Data Recovery
- Ability to validate forensic hardware, software, examination procedures.
- Email headers understanding.
- Ability to generate and validate forensically sterile media.
- Ability to generate and validate a forensic image of media.
- Understand hashing and hash sets.
- Understand file headers.
- Ability to extract file metadata from common file types.
- Understanding of file fragmentation.
- Ability to extract component files from compound files.
- Knowledge of encrypted files and strategies for recovery.
- Knowledge of Internet browser artifacts.
- Knowledge of search strategies for examining electronic
- Windows Artifacts
- Understanding the purpose and structure of component files that create the windows registry.
- Identify and capability to extract the relevant data from the dead registry.
- Understand the importance of restore points and volume shadow copy services.
- Knowledge of the locations of common Windows artifacts.
- Ability to analyze recycle bin.
- Ability to analyze link files.
- Analyzing of logs
- Extract and view windows logs
- Ability to locate, mount and examine VHD files.
- Understand the Windows swap and hibernation files.
- Report Writing (Presentation of findings)
- Ability to conclude things strongly based on examination observations.
- Able to report findings using industry standard technically accurate terminologies.
- Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
- Be able to consider legal boundaries when undertaking a forensic examination
Security Course Flow
Here is our list of security related courses.
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar
- CL-415: AWS System Operations
- CL-425: AWS Security Operations and Architecture
- CT-325: Security+
- CT-395: CySA+ Cybersecurity Analyst
- CT-405: PenTest+
- CT-425: CompTIA SecurityX
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- N-595: VoIP Security Analysis and Design
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
- PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance
- PP-244:CIPM + CIPP/E 4 Day GDPR Ready
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-385: TCP/IP Analysis & Implementation
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-525: Certified Penetration Testing Professional (CPENT)
- TN-535: Certified Forensic Computer Examiner (CFCE)
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-555: Certified Ethical Hacker v13 (CEH)
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-715: Systems Security Certified Practitioner (SSCP)
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-812: Information Systems Security Engineering Professional (ISSEP)
- TN-813: Certified in Governance, Risk and Compliance (CGRC)
- TN-8150: CISSP Certification Preparation Seminar
- TN-8155: HCISPP Preparation Seminar
- TN-822: Certified Information Systems Auditor (CISA) Seminar
- TN-825: Certified Information Security Manager (CISM) Seminar
- TN-835: Certified in Risk and Information Systems Control (CRISC) Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-905: Cyber Threat Intelligence Analysis
- TN-909: Windows Forensic Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course