Here are our Microsoft Programming courses:
Here are the Cisco Security course offerings:
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- TN-865: Wireshark Network Traffic and Security Analysis
Course Overview:
PA-222: Palo Alto Networks Panorama Essentials Training Class is a two-day course that teaches students to configure and manage the Palo Alto Networks Panorama management server. Through hands-on training, students learn high end skills of how to integrate Palo Alto Networks next-generation firewalls into their network infrastructure and manage them with Palo Alto Networks Panorama management server.This is not a virtualized theoretical course. This is hands-on, real world in the classroom instructor led with lab assistance, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls and their enterprise management.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, Cisco, Unix, and Windows certifications.
Attendees to the Palo Alto Networks Panorama Essentials Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration 2 days
Course Objectives:
Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama management server, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS) through Panorama.
|
|
Prerequisites:
- Security+, Network+, Palo Alto Networks Firewall Essentials FastTrack and networking experience is recommended.
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class? Then let everyone know!
Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
User: dhonore
Instructor comments: Dave's presentation style is engaging and lively.
Facilities comments: The room was adequate for the needs of the class.
User: phouck
Instructor comments: David was very good. Although he went very fast at times.
Facilities comments: The room was ok. it was bit dark.
Liked the class? Then let everyone know!
Course Overview:
This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-400: Microsoft Azure DevOps Solutions will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Outline:
- Planning for DevOps
- Getting started with Source Control
- Scaling Git for enterprise DevOps
- Consolidating Artifacts & Designing a Dependency Management Strategy
- Implementing Continuous Integration with Azure Pipelines
- Managing Application Config and Secrets
- Managing Code Quality and Security Policies
- Implementing a Container Build Strategy
- Manage Artifact versioning, security & compliance
- Design a Release Strategy
- Set up a Release Management Workflow
- Implement an appropriate deployment pattern
- Implement process for routing system feedback to development teams
- Implement a mobile DevOps strategy
- Infrastructure and Configuration Azure Tools
- Azure Deployment Models and Services
- Create and Manage Kubernetes Service Infrastructure
- Third Party Infrastructure as Code Tools available with Azure
- Implement Compliance and Security in your Infrastructure
- Recommend and design system feedback mechanisms
- Optimize feedback mechanisms
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Fundamental knowledge about Azure, version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software.
-
Comments
Latest comments from students