Course Overview:
This course teaches students how to use the powerful PERL programming language, focusing on hands-on labs to promote retention & challenge students to apply their skills to new situations. PERL is a flexible, easy to use language suitable for many tasks such as system administration, web applications & database integration. System administrators, web programmers & database administrators will benefit from mastering this powerful programming language. This course reviews & builds on the information presented in PL-115: Fundamentals of Computer Programming.
Attendees to P-245: Programming with PERL will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Course Duration: 5 days
Course Objectives:
- Introduction
- Scalar Data
- Lists & Arrays
- Subroutines
- Input & Output
- Hashes
- In the World of Regular Expressions
- Matching with Regular Expressions
- Processing Text with Regular Expressions
- More Control Structures
- File Tests
- Directory Operations
- Strings & Sorting
- Process Management
- PERL Modules
- Some Advanced PERL Techniques
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Accessing the Network
- Advanced Fuzzing Techniques
- Advanced Stack Smashing
- Attacking the Windows Domain – Enumeration
- Attacking the Windows Domain – Restricted Desktops
- Attacking the Windows Domain – The Attacks
- Building a Metasploit Module
- Crypto for Penetration Testers
- Exploiting the Network
- Fuzzing Introduction and Operation
- Introduction to Memory and Dynamic Linux Memory
- Introduction to Windows Exploitation
- Manipulating the Network
- Python and Scapy For Penetration Testers
- Shellcode
- Smashing the Stack
- Windows Heap Overflow Introduction
- Windows Overflows
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: ryanv
Instructor comments: Great.
Facilities comments: N/A. Hotel.
User: sean.hollinger
Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow.
Facilities comments: adequate
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.
Course Overview:
SharePoint is the Premier Office Collaboration Server Suite. Two of the most requested features to implement in any SharePoint Server environment is building custom workflows and incorporating InfoPath forms into the site. This course aims to build the average user’s body of knowledge and skill set to allow them to take on some of this responsibility. Students will learn the SharePoint Designer software, a free product, to do these tasks.
Over the course of the two days the users will work on a live SharePoint Server environments making changes to pages, adding pages and making Workflows. They will learn how to build InfoPath forms and migrate them to the SharePoint environment.
Attendees to TN-5202: Microsoft SharePoint 2010/2013: Workflows and Designing InfoPath Forms will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 2 days
Course Objectives:
- Identify the basic features of the SharePoint Designer environment.
- Create a new subsite.
- Add content to a web page.
- Use Cascading Style Sheets to format a SharePoint site.
- Link web pages.
- Add SharePoint components to the site.
- Automate business processes with workflows.
- Create InfoPath forms.
- Import and export forms.
- Customize a form layout.
- Distribute forms.
- Work with a database.
Prerequisites:
- Knowledge of HTML not required, but helpful
- Basic Computer Skills
Comments
Latest comments from students
User: golf123
Instructor comments: Mr. Moore knew and presented the course very well. I would definitely take future courses with TechNow.
Liked the class? Then let everyone know!