TechNow provides a wide variety of skills based computer training and testing.  With our Headquarters in San Antonio, TX, we have provided services including computer training around the United States to many individuals and corporations.

Our products and services are designed for those who are seeking to expand their knowledge base, whether with one class or a series of classes to gain certification in specific areas of training.

Our talented and knowledgeable instructors enjoy teaching and sharing their skills; allowing you to expand and learn essential computer skills.

 

This is a list of some of our Products and Services

Hardware, Software, and Consulting

Classroom in a Box

Authorized Testing Center

Customized Training

in   

    After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

    Course Overview:

    This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field.  Assessors and Auditors have to face many technologies that are not part of the main stream.  TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures.  Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system.  Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.

    Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF.  TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements.  TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security.  Cross Domain overlays are presented that fits the work flow of an assesor.  PII overlays and any overlays that an organization uses and can be made available are also presented.  

    This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503.  Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance.  ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program.  TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency.  TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.

    More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively.  The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies.  Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).

    TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.

    A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls.  Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered.  This course is not theory or death by power point.  Real scenarios are presented as exercises.  A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Establish a baseline of RMF knowledge
    • Validate essential security controls, programs, and metrics
    • DoD DCD 6/3 to ICD 503 Transition
    • Lab Environtment and the Cyber Range
    • Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
    • Risk Assessment Report (RAR)
    • Systems Security Plan (SSP)
    • Security Assessment Report (SAR)
    • Plans of Action and Milestone (POAM)

    Prerequisites:

    Experience in the field of auditing and assesments.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview: 

    This course details how a well-educated Product Owner and a knowledgeable Scrum Master can work together to deliver a successful product with Agile principles using SCRUM approach.  Designed specifically for students who want to learn the mechanics of an Agile / Scrum team being led by a Product Owner and a Scrum Master.

    This course offers a firm grasp of Agile principles as they relate to new product development.  If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course covers the Agile adaptive life cycle framework and everything in between.

    Attendees to PM-232: Product Owner and Scrum Master Roles in AGILE using SCRUM will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 2 Days

    Course Objectives: At the conclusion of this course, students will be able to:

    • Understand the Scrum Flow, the core components of the Scrum framework
    • Understand the principles of empirical process control
    • Understand the scope of the Product Owner role in detail
    • Understand the scope of the Scrum Master role at a high level
    • Understand the scope of the Scrum team roles and why there is no project manager
    • Understand how the Scrum Master measures team velocity
    • Understand the importance of having the product vision as an overarching goal galvanizing the entire Scrum team
    • Understand the relationship between the vision and the product roadmap
    • Understand the different estimation levels in Scrum
    • Understand what the Product Backlog is and what it is not
    • Understand Product Backlog grooming
    • Understand that Scrum planning is adaptive, iterative, incremental, and collaborative

     

    Target Student:

    • Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.

    Course Objectives:

    • Install and troubleshoot Ansible on central nodes and managed hosts
    • Automate administration tasks with Ansible playbooks and ad hoc commands
    • Write effective Ansible playbooks
    • Protect sensitive data used by tasks with Ansible Vault.
    • Install and configure Ansible Tower for enterprise Ansible management
    • Use Ansible Tower to control access to inventories and machine credentials by users and teams
    • Create job templates in Ansible Tower to standardize playbook execution.
    • Centrally launch playbooks and monitor and review job results with Ansible Tower

     

    Course Outline:

    • Introduce Ansible
    • Deploy Ansible
    • Implement playbooks
    • Manage variables and inclusions
    • Implement task control
    • Implement Jinja2 templates
    • Implement roles
    • Configure complex playbooks
    • Implement Ansible Vault
    • Troubleshoot Ansible
    • Install Ansible Tower and describe Ansible Tower’s architecture
    • Create users and teams for role-based access control
    • Create and manage inventories and credentials
    • Manage projects for provisioning with Ansible Tower
    • Construct advanced job workflows
    • Update inventories dynamically and compare inventory members
    • Maintenance and administration of Ansible Tower

     
    Dates/Locations:

    No Events

    Duration: 5 Days

    Prerequisites:

    • Become a Red Hat Certified System Administrator, or demonstrate equivalent experience

    Target Audience:

    This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.