Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Plan and implement an IPv4 network
- Implement Dynamic Host Configuration Protocol (DHCP)
- Implement IPv6
- Implement Domain Name System (DNS)
- Implement and manage IP address management (IPAM)
- Plan for remote access
- Implement DirectAccess
- Implement virtual private networks (VPNs)
- Implement networking for branch offices
- Configure advanced networking features
- Implement Software Defined Networking
Prerequisites:
- A basic understanding of networking fundamentals
- Experience working with Windows Server 2008 or Windows Server 2012
- Experience working in a Windows Server infrastructure enterprise environment
- Knowledge of the Open Systems Interconnection (OSI) model
- Understanding of core networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking
- Basic knowledge of the TCP/IP protocol stack, addressing and name resolution
- Experience with and knowledge of Hyper-V and virtualization
- Hands-on experience working with the Windows client operating systems such as Windows 8.1 or Windows 10
Liked the class? Then let everyone know!
CCFE Core Competencies
- Procedures and Legal Issues
- Computer Fundamentals
- Partitioning Schemes
- Data Recovery
- Windows File Systems
- Windows Artifacts
- Report writing (Presentation of Finding)
- Procedures and Legal issues
- Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
- Ability to explain the on-scene action taken for evidence preservation.
- Ability to maintain and document an environment consolidating the computer forensics.
- Computer Fundamentals
- Understand BIOS
- Computer hardware
- Understanding of numbering system (Binary, hexadecimal, bits, bytes).
- Knowledge of sectors, clusters, files.
- Understanding of logical and physical files.
- Understanding of logical and physical drives.
- Partitioning schemes
- Identification of current partitioning schemes.
- Understanding of primary and extended partition.
- Knowledge of partitioning schemes and structures and system used by it.
- Knowledge of GUID and its application.
- Windows file system
- Understanding of concepts of files.
- Understanding of FAT tables, root directory, subdirectory along with how they store data.
- Identification, examination, analyzation of NTFS master file table.
- Understanding of $MFT structure and how they store data.
- Understanding of Standard information, Filename, and data attributes.
- Data Recovery
- Ability to validate forensic hardware, software, examination procedures.
- Email headers understanding.
- Ability to generate and validate forensically sterile media.
- Ability to generate and validate a forensic image of media.
- Understand hashing and hash sets.
- Understand file headers.
- Ability to extract file metadata from common file types.
- Understanding of file fragmentation.
- Ability to extract component files from compound files.
- Knowledge of encrypted files and strategies for recovery.
- Knowledge of Internet browser artifacts.
- Knowledge of search strategies for examining electronic
- Windows Artifacts
- Understanding the purpose and structure of component files that create the windows registry.
- Identify and capability to extract the relevant data from the dead registry.
- Understand the importance of restore points and volume shadow copy services.
- Knowledge of the locations of common Windows artifacts.
- Ability to analyze recycle bin.
- Ability to analyze link files.
- Analyzing of logs
- Extract and view windows logs
- Ability to locate, mount and examine VHD files.
- Understand the Windows swap and hibernation files.
- Report Writing (Presentation of findings)
- Ability to conclude things strongly based on examination observations.
- Able to report findings using industry standard technically accurate terminologies.
- Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
- Be able to consider legal boundaries when undertaking a forensic examination
Course Overview:
The HCISPP is the only certification that combines cybersecurity skills with privacy best practices and techniques. It demonstrates you have the knowledge and ability to implement, manage, and assess security and privacy controls to protect healthcare organizations using policies and procedures established by the cybersecurity experts at (ISC)2. TechNows HCISPP Certification Boot Camp is a comprehensive review of Healthcare cybersecurity with privacy best practices & industry best practices.
Attendees to TN-8155: HCISPP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction..
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Strategically focus your preparation for HCISPP Certification
- Cover a broad spectrum of topics in the 7 domains of the HCISPP Common Body of Knowledge (CBK)
- Gain knowledge on the Healthcare industry including third party relationships and health data management concepts
- Identify applicable regulations, compliance frameworks, privacy principles and policies to protect information security
- Develop risk management methodology and identify control assessment procedures
Audience:
- The HCISPP certification is ideal for security professionals responsible for safeguarding protected health information (PHI). Take this HCISPP training course to prepare to manage and implement security controls for healthcare information. HCISPPs are instrumental to a variety of job functions: Compliance Officer, Information Security Manager, Privacy Officer, Compliance Auditor, Risk Analyst, Medical Records Supervisor, IT Manager, Privacy & Security Consultants, and Health Information Manager.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
ITIL Version 4 is divided into 5 areas: Continual Service Improvement; Service Strategy; Service Design; Service Transition; and Service Operation. These 5 areas support the overall focus of ITIL’s service management through the Service Life cycle. IT-113: IT Infrastructure LIbrary (ITIL)- Foundations Course provides a detailed introduction of terms, definitions, benefits, and relationships of the following function and processes as well as roles and responsibilities that supports them.
Attendees to IT-113: IT Infrastructure Library (ITIL) – Foundations Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
12/08/2025 - 12/11/2025 08:00 -16:00 |
IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course TechNow, Inc, San Antonio TX |
|
01/20/2026 - 01/23/2026 08:00 -16:00 |
IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course TechNow, Inc, San Antonio TX |
|
04/07/2026 - 04/10/2026 08:00 -16:00 |
IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course TechNow, Inc, San Antonio TX |
|
09/08/2026 - 09/11/2026 08:00 -16:00 |
IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course TechNow, Inc, San Antonio TX |
|
12/14/2026 - 12/17/2026 08:00 -16:00 |
IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- Service Desk
- Incident Management
- Problem Management
- Configuration Management
- Financial Management for IT
- IT Service Continuity Management
- Service Level Management
- Change Management
- Release Management
- Capacity Management
- Availability Management
Prerequisites:
- Students should have some experience with the specification, development, installation and/or management of information technology.
Comments
Latest comments from students