After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

     

    Course Overview:

    This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.

    NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment

    Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    01/20/2026 - 01/23/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    04/07/2026 - 04/08/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    08/03/2026 - 08/04/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    11/09/2026 - 11/10/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX

    Course Duration: 3 days

    Course Outline:

    • Cloud Concepts
    • Core Azure Services
    • Security, Privacy, Compliance, And Trust
    • Azure Pricing and Support

    Lab Objectives:

      • Create a virtual machine
      • Deploy Azure container instances
      • Create a virtual network
      • Create blob storage
      • Create a SQL database
      • Implement an Azure IoT Hub
      • Implement Azure Functions
      • Create a web app
      • Create a VM with a Template
      • Create a VM with PowerShell
      • Create a VM with CLI
      • Secure network traffic
      • Implement Azure key vault
      • Create an Azure Policy
      • Manage access with RBAC
      • Manage resource locks
      • Implement resource tagging
      • Exploring the Trust Center
      • Use the Azure Pricing Calculator
      • Use the Azure TCO Calculator
      • Open a Support request
      • Calculate composite SLAs
      • Access Azure Preview features

    Prerequisites :

        • There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
        • This course is suitable for IT personnel who are just beginning to work with Azure.
        • This course primarily uses the Azure portal to create services and does not require scripting skills.
        • Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
        • This course provides an Azure pass and optional lab environment.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination
     

    Course Overview:

    This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.

    Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.

    Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.

    Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Virtual Infrastructure Overview
    • ESX and ESXi Server Installation
    • Configuration of Networking, Scalability and Security
    • Storage
    • Install and Configure vCenter Server and Components
    • Creation, Deployment, Management, and Migration of Virtual Machines
    • Utilize vCenter Server for Resource Management
    • Utilize vCenter Server for Virtual Machine Access Control and User Managment
    • Use vCenter Server to increase scalability
    • Monitoring Your Environment
    • Data & Availability Protection Troubleshooting
    • Use VMware vCenter Update Manager to apply ESXi patches
    • Use vCenter Server to manage vMotion, HA, DRS and data protection.

    Course Overview:

    The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.

    Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    03/09/2026 - 03/13/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX
    06/29/2026 - 07/03/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX
    10/05/2026 - 10/09/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
    • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
    • Troubleshoot Layer 2 connectivity using VLANs and trunking
    • Implementation of redundant switched networks using Spanning Tree Protocol
    • Troubleshooting link aggregation using Etherchannel
    • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
    • Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
    • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
    • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
    • Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
    • Describe the virtualization technology of servers, switches, and the various network devices and components
    • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
    • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
    • Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
    • Describe wireless roaming and location services
    • Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
    • Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
    • Troubleshoot wireless client connectivity issues using various available tools
    • Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
    • Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
    • Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
    • Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
    • Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
    • Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
    • Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
    • Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
    • Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
    • Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
    • Explain basic Python components and conditionals with script writing and analysis
    • Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
    • Describe APIs in Cisco DNA Center and vManage

    Prerequisites:

    • CCNA certification
    • Implementation of Enterprise LAN networks
    • Basic understanding of Enterprise routing and wireless connectivity
    • Basic understanding of Python scripting

     

    Comments

    Latest comments from students


    User: don.seguin

    Instructor comments: Tim was a great.

    Facilities comments: The classroom was great.


    User: jrtrussell

    Instructor comments: Awesome

    Facilities comments: Great


    Liked the class?  Then let everyone know!