After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination
     

    Course Overview:

    TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment.  Security teams wrestle with the impact and liability of Cloud computing on an organization.  This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).

    Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment.  Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy.  Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds.   Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.

    Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    02/09/2026 - 02/12/2026
    08:00 -16:00
    TN-913: Cloud Security Fundamentals
    TechNow, Inc, San Antonio TX
    05/26/2026 - 05/29/2026
    08:00 -16:00
    TN-913: Cloud Security Fundamentals
    TechNow, Inc, San Antonio TX
    09/08/2026 - 09/11/2026
    08:00 -16:00
    TN-913: Cloud Security Fundamentals
    TechNow, Inc, San Antonio TX
    12/07/2026 - 12/10/2026
    08:00 -16:00
    TN-913: Cloud Security Fundamentals
    TechNow, Inc, San Antonio TX

    Course Duration: 3 days

    Course Objectives:

    • Cloud computing introduction
    • Security challenges in the cloud
    • Infrastructure security in the cloud
    • Policy, risk, and governance for cloud computing
    • Compliance and legal considerations
    • Audit and assessment for the cloud
    • Data security in the cloud
    • Identity and Access Management (IAM)
    • Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
    • Intrusion detection and incident response

    Course Prerequisites:

    • GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures
    • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

    Comments

    Latest comments from students


    User: reedrobt

    Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?

    Facilities comments: Home2 location was well-kept and convenient to other services.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This is an introductory course into the Python scripting language.  This class uses a hands-on approach in teaching the Python language.  This course builds the prerequisite skills for TechNow's P-345: Python for Pentration Testers course.  Getting comfortable with Python is important to understanding how Python can be utilitized for offensive measures.

    This course is hands-on with the instructor walking the students through many short examples to exemplify an objective.  Dexterity with the language comes through many small code examples to produce the desired result.  Students have fun acquiring points for all the code examples they get correct.  We must be having fun because TechNow is always amazed at how competitive students are in trying to acquire the most points!  

    The instructor will focus on the level that each student is currently at, and ensure the student absorbs the subject matter.  Programming is not a daily tasking of administrators or offensive operators and TechNow understands that.  As an instructor led course TechNow is very successful in making Python accessible to those who do not live eat and breath programming.  If a student's ultimate goal is to attend a course like TechNow's P-345: Python for Pentration Testers course, then not being bogged down in the Python language is critical, and this course (P-325: Python Programming) meets that objective.

    Recently we have introduced Raspberry Pi's and multiple sensors to the P-325: Python Programming course.  This enables the student to actually see productive results from their coding skills in the physical world!  Some examples that students create programs for are: Motion detectors, distance, temperature, cameras and keypads.

    Attendees to P-325: Python Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • How Python Runs Programs
    • Introducing Python Object Types
      • Numeric Types
      • Dynamic Typing
    • Variables
    • Regular Expressions
    • Strings
    • Conditionals
      • if Tests and Syntax Rules
    • Lists and Dictionaries
    • Tuples and Files
    • Introducing Python Statements
    • Assignments, Expressions, and Prints
    • while and for Loops
    • Iterations and Comprehensions
    • Documentation
    • Function Basics
    • Built-In Functions
    • Scopes
    • Arguments
    • Modules
    • Module Packages and Importing
    • Classes and OOP
    • Operator Overloading
    • Recursion
    • Exception Coding Details
    • Exception Objects
    • Unicode and Byte Strings
    • Working with Raspberry Pi
      • Writing code for sensors

    Prerequisites:

    • Experience with some form of programming is preferred

     

    Comments

    Latest comments from students


    User: slewis8435

    Instructor comments: Very good instructor - he was excited about the material, very knowledgeable, and explained things clearly.

    Facilities comments: The facilities were fine - plenty of room for each student to set up an extra computer and have room for note taking


    User: nathan.karras

    Instructor comments: Instructor was extremely knowledgeable in programming and scripting. He encouraged students to explore and ask questions. He would work with individuals to troubleshoot lab problems sets. Would highly recommend as an instructor.

    Facilities comments: Room got a little warn. Instructor purchased fans to cool things off for the class. Projector had over scan.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

    After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Outline:

    • Identity and access
      • Configure Azure Active Directory for Azure workloads and subscriptions
      • Configure Azure AD Privileged Identity Management
      • Configure security for an Azure subscription
    • Platform Protection
      • Understand cloud security
      • Build a network
      • Secure network
      • Implement host security
      • Implement platform security
      • Implement subscription security
    • Security Operations
      • Configure security services
      • Configure security policies by using Azure Security Center
      • Manage security alerts
      • Respond to and remediate security issues
      • Create security baselines
    • Data and Applications
      • Configure security policies to manage data
      • Configure security for data infrastructure
      • Configure encryption for data at rest
      • Understand application security
      • Implement security for application lifecycle
      • Secure applications
      • Configure and manage Azure Key Vault

    Prerequisites :

        • AZ-900: Microsoft Azure Fundamentals
        • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
        • Student must be able to program in an Azure Supported Language.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!