Course Overview:

The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.

Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
  • Troubleshoot Layer 2 connectivity using VLANs and trunking
  • Implementation of redundant switched networks using Spanning Tree Protocol
  • Troubleshooting link aggregation using Etherchannel
  • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
  • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
  • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  • Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
  • Describe the virtualization technology of servers, switches, and the various network devices and components
  • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
  • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
  • Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
  • Describe wireless roaming and location services
  • Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
  • Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
  • Troubleshoot wireless client connectivity issues using various available tools
  • Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
  • Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
  • Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
  • Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
  • Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
  • Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
  • Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
  • Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
  • Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
  • Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
  • Explain basic Python components and conditionals with script writing and analysis
  • Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
  • Describe APIs in Cisco DNA Center and vManage

Prerequisites:

  • CCNA certification
  • Implementation of Enterprise LAN networks
  • Basic understanding of Enterprise routing and wireless connectivity
  • Basic understanding of Python scripting

 

Comments

Latest comments from students


User: don.seguin

Instructor comments: Tim was a great.

Facilities comments: The classroom was great.


User: jrtrussell

Instructor comments: Awesome

Facilities comments: Great


Liked the class?  Then let everyone know!

    After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

    Course Overview:

    Certified in Risk and Information Systems Control (CRISC), is for professionals responsible for an organization's risk management program.  Students looking to acquire CRISC qualify themselves as IT security analyst, security engineer architect, information assurance program manager and senior IT auditor.  CRISC certified professionals manage risk, design and oversee response measures, monitor systems for risk, and ensure the organization's risk management strategies are met.

    The CRISC exam will primarily align with the terminology and concepts described in The Risk IT Framework, The Risk IT Practioner Guide, and COBIT 5.  This will include applications in the evaluation and monitoring of IT-based risk, as well as the design and implementation of IS controls. 

    The CRISC exam covers four domains that are periodically updated to reflect the changing needs of the profession:

    • Domain 1: Risk Identification 
    • Domain 2: Risk Assessment
    • Domain 3: Risk Response and Mitigation
    • Domain 4: Risk and Control Monitoring and Reporting

    This course is designed to assist in your exam preparation for the CRISC exam.

    Attendees to TN-835: Certified in Risk and Information Systems Control (CRISC) Seminar will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Risk IT Framework—Purpose and Principles
    • Essentials of Risk Governance, Evaluation, and Response
    • Risk and Opportunity Management Using CobiT, Val IT and Risk IT
    • The Risk IT Framework Process Model Overview
    • Managing Risk in Practice—The Practitioner Guide Overview
    • Overview of the Risk IT Framework Process Model 
    • The Risk IT Framework

    Prerequisites:

    A minimum of at least three (3) years of cumulative work experience performing the tasks of a CRISC professional across at least three (3) CRISC domains is required for certification. There are no substitutions or experience waivers.

    Comments

    Latest comments from students


    User: tracycampbell

    Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

    Facilities comments: The Home2Suites by Hilton was FANTASTIC!



    Liked the class?  Then let everyone know!

     

    Course Overview:

    The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.  Let us help you prepare for the CompTIA Security+ exam (SY0-701).

    TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.

    Attendees to CT-325: Security+ will receive TechNow approved course materials and TechNow expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    08/18/2025 - 08/22/2025
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    10/27/2025 - 10/31/2025
    08:00 -20:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    12/15/2025 - 12/19/2025
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Compare and contrast attacks
    • Compare and contrast security controls
    • Use security assessment tools
    • Explain basic cryptography concepts
    • Implement a public key infrastructure
    • Implement identity and access management controls
    • Manage access services and accounts
    • Implement a secure network architecture
    • Install and configure security appliances
    • Install and configure wireless and physical access security
    • Deploy secure host, mobile, and embedded systems
    • Implement secure network access protocols
    • Implement secure network applications
    • Explain risk management and disaster recovery concepts
    • Describe secure application development concepts
    • Explain organizational security concepts

    Prerequisites:

    • CompTIA A+ and Network+ certifications, or equivalent knowledge.
    • Windows 7/8/10 and Server 2008/2012/2016 experience required.
    • Six to nine months experience in networking, including experience in configuring & managing TCP/IP.

    Comments

    Latest comments from students


    User: joshjepsen@hotmail.com

    Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.



     

    Liked the class?  Then let everyone know!

     

     

     

     

     

     

     

    Course Overview:

    The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

    The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

    What’s Included:

    • 5 days of instructor-led in classroom training
    • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
    • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
    • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
    • CHFI Courseware
    • Exam Voucher
    • CHFI onsite exam scheduling

    Course Objectives:

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
    • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
    • Identify & check the possible source/ incident origin
    • Recover deleted files and partitions in Windows, MAC OS X, and Linux
    • Conduct reverse engineering for known and suspected malware files
    • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

      • Module 01. Computer Forensics in Today’s World
      • Module 02. Computer Forensics Investigation Process
      • Module 03. Understanding Hard Disks and File Systems
      • Module 04. Data Acquisition and Duplication
      • Module 05. Defeating Anti-forensics Techniques
      • Module 06. Operating System Forensics (Windows, Mac, Linux)
      • Module 07. Network Forensics
      • Module 08. Investigating Web Attacks
      • Module 09. Database Forensics
      • Module 10. Cloud Forensics
      • Module 10. Malware Forensics
      • Module 11. Investigating Email Crimes
      • Module 12. Investigating Email Crimes
      • Module 13. Mobile Forensics
      • Module 14. Forensics Report Writing and Presentation

     

    Prerequisites:

        • 2+ years of proven information security work experience
        • Educational background with digital security specialization

      Target Audience:

        • Law Enforcement
        • Defense & Military
        • E-Business Security
        • Systems Administrators
        • Legal Professionals
        • Banking & Insurance professionals
        • Government Agencies
        • IT Managers

    • Comments

      Latest comments from students


      Liked the class?  Then let everyone know!