Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

in   

 

 

 

 

Course Overview:

Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.

If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.

This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.

Dates/Locations:

No Events

Duration: 10 Days

Course Content:

    • Module 01. Installing Windows
    • Module 02. Updating Windows
    • Module 03. Post-Installation Configuration and Personalization
    • Module 04. Configuring Peripherals and Drivers
    • Module 05. Configuring Networks
    • Module 06. Configuring Storage
    • Module 07. Managing Apps in Windows 10
    • Module 08. Configuring Authorization & Authentication
    • Module 09. Configuring Data Access and Usage
    • Module 10. Configuring Advanced Management Tools
    • Module 11. Supporting the Windows 10 Environment
    • Module 12. Troubleshooting the Windows OS
    • Module 13. Troubleshooting Files & Applications
    • Module 14. Troubleshooting Hardware and Drivers
    • Module 15. Planning an Operating System Deployment Strategy
    • Module 16. Implementing Windows 10
    • Module 17. Managing Updates for Windows 10
    • Module 18. Device Enrollment
    • Module 19. Configuring Profiles
    • Module 20. Application Management
    • Module 21. Managing Authentication in Azure AD
    • Module 22. Managing Devices and Device Policies
    • Module 23. Managing Security

 

Prerequisites:

      • Microsoft 365 Certified Fundamentals (M-MS900)

Target Audience:

IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

in Uncategorized  
 

Course Overview:

PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.

Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Packages and namespaces
  • References and scoping
  • Manipulating complex data structures
  • Object-oriented programming
  • Writing and using modules
  • Testing PERL code
  • Contributing to CPAN

Prerequisites:

 

Comments

Latest comments from students


User: J Masters

Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.


 

Liked the class?  Then let everyone know!

in Uncategorized  

TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.

in Uncategorized  

Course Overview:

Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.

Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Outline:

Data Management

  • Define an index that satisfies a given set of requirements
  • Define and use an index template for a given pattern that satisfies a given set of requirements
  • Define and use a dynamic template that satisfies a given set of requirements
  • Define an Index Lifecycle Management policy for a time-series index
  • Define an index template that creates a new data stream

Searching Data

  • Write and execute a search query for terms and/or phrases in one or more fields of an index
  • Write and execute a search query that is a Boolean combination of multiple queries and filters
  • Write an asynchronous search
  • Write and execute metric and bucket aggregations
  • Write and execute aggregations that contain sub-aggregations
  • Write and execute a query that searches across multiple clusters
  • Write and execute a search that utilizes a runtime field

Developing Search Applications

  • Highlight the search terms in the response of a query
  • Sort the results of a query by a given set of requirements
  • Implement pagination of the results of a search query
  • Define and use index aliases
  • Define and use a search template

Data Processing

  • Define a mapping that satisfies a given set of requirements
  • Define and use a custom analyzer that satisfies a given set of requirements
  • Define and use multi-fields with different data types and/or analyzers
  • Use the Reindex API and Update By Query API to reindex and/or update documents
  • Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
  •   Define runtime fields to retrieve custom values using Painless scripting

Cluster Management

  • Diagnose shard issues and repair a cluster’s health
  • Backup and restore a cluster and/or specific indices
  • Configure a snapshot to be searchable
  • Configure a cluster for cross-cluster search
  • Implement cross-cluster replication

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

in Uncategorized