Twenty years of experience in the area of information assurance ensures that you are benefiting from a very mature and successful security training program.  TechNow offers the full suite of security training courses to meet any DoD 8570 requirements.

Security Course Flow

Unix Course Flow

Here is our list of security related courses.

    in   

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.

    Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Accessing the Network
    • Advanced Fuzzing Techniques
    • Advanced Stack Smashing
    • Attacking the Windows Domain – Enumeration
    • Attacking the Windows Domain – Restricted Desktops
    • Attacking the Windows Domain – The Attacks
    • Building a Metasploit Module
    • Crypto for Penetration Testers
    • Exploiting the Network
    • Fuzzing Introduction and Operation
    • Introduction to Memory and Dynamic Linux Memory
    • Introduction to Windows Exploitation
    • Manipulating the Network
    • Python and Scapy For Penetration Testers
    • Shellcode
    • Smashing the Stack
    • Windows Heap Overflow Introduction
    • Windows Overflows

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: ryanv

    Instructor comments: Great.

    Facilities comments: N/A. Hotel.


    User: sean.hollinger

    Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow.

    Facilities comments: adequate


    Liked the class?  Then let everyone know!

     

    Course Overview:

    PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.

    Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Packages and namespaces
    • References and scoping
    • Manipulating complex data structures
    • Object-oriented programming
    • Writing and using modules
    • Testing PERL code
    • Contributing to CPAN

    Prerequisites:

     

    Comments

    Latest comments from students


    User: J Masters

    Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

    Duration: 5 Days

    Audience:

    Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisite:
    • Network+

    Dates/Locations:

    No Events

    Course Outline:

    DAY ONE

    Course Set Up and Analyzer Testing

    Network Analysis Overview
    Wireshark Functionality Overview
    Capturing Wired and Wireless Traffic
    Define Global and Personal Preferences for Faster Analysis
    Defined Time Values and Interpret Summaries
    Interpret Basic Trace File Statistics to Identify Trends
    Create and Apply Display Filters for Efficient Analysis

    DAY TWO

    Follow Streams and Reassemble Data
    Use Wireshark’s Expert System to Identify Anomalies
    TCP/IP Analysis Overview
    Analyze Common TCP/IP Traffic Patterns

    DAY THREE

    Graph I/O Rates and TCP Trends
    802.11 (WLAN) Analysis Fundamentals
    Voice over IP (VoIP) Analysis Fundamentals
    Network Forensics Fundamentals

    DAY FOUR

    Detect Scanning and Discovery Processes
    Analyze Suspect Traffic

    DAY FIVE

    Use Command‐Line Tools

    Next/Related Courses:

     

     

      

     

    Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.

    TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.

     

    Dates/Locations:

    No Events

    Duration: 2 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.

    Day 1

    • Module 0 – Introduction & Overview
    • Mod 1: Overview
      • Panorama Solution
      • Deployment Design
    • Mod 2: Initial Configuration
      • Interface Configuration
      • Setup Configurations
      • Device Deployment
      • Configuration Management
    • Mod 3: Templates
      • Templates Overview
      • Common Organization
      • Strategies
      • Configuring Templates
    • Mod 4: Device Groups
      • Device Groups
      • Objects
      • Policies
      • Device Group Commit

     

    Day 2

    • Mod 5: Administration
      • Admin Roles and Access
      • Control
      • Commit Procedure
    • Mod 6: Logging and
      • Reporting
      • Logging
      • Application Command
      • Center
      • App-Scope
      • Correlation Objects
      • Reports
    • Mod 7: Log Collectors
      • Plan a Log Collection
      • Deployment
      • Distributed Data Collection
      • Log Deployment
      • Configure Dedicated Log
      • Collector
      • Managed Collector Groups
    • Mod 8: Business Continuity
      • Panorama High Availability
      • Collector Group
      • Redundancy
      • Export Configuration
      • Disk Installation

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!