Course Overview:

As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications.  In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP.   Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.  Other protocols such as Nortel's UNIStim will be addressed.  As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures.   Various open source tools including those in BackTrack are used for VoIP attacks.  A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.

Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • VoIP Architecture
  • VoIP Signaling and media protocols
  • Common VoIP authentication mechanisms
  • Common VoIP encryption techniques
  • VoIP protocol analysis with Wireshark
  • Maintaining QoS while mitigating DoS
  • VoXML, XML, and application integration security
  • Converged network security design and implementation
  • Impact of NAT and firewalls
  • SIP, H.323, and MGCP vulnerabilities
  • VPN, IPsec and SRTP to secure VoIP services
  • Penetration testing with open source tools
  • Attacks for Eavesdropping, call redirection, and DoS
  • Design of hacked firmware virtualization layer
  • Concise lockdown steps for network hardware and VoIP

Prerequisites:

  • This is an advanced Information Security Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • As well as an understanding of TCP/IP

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-825: Certified Information Security Manager (CISM) Seminar
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • in   

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination
     

    Course Overview:

    TN-575: Open Source Network Security Monitoring teaches students how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. No network is bullet proof and when attackers access your network, this course will show you how to build a security net to detect, contain, and control the attacker. Sensitive data can be monitored and deep packet and deep attachment analysis can be achieved. As organizations stand up a Security Operations Center (SOC) the enterprise NSM is the key ingredient to that SOC. This course not only teaches how to implement an NSM technologically, but how to effectively monitor an enterprise operationally. You will learn how to architect an NSM solution: where to deploy your NSM platforms and how to size them, stand-alone or distributed, and integration into packet analysis, interpret evidence, and integrate threat intelligence from external sources to identify sophisticated attackers. A properly implemented NSM is integral to incident response and provides the responders timely information to react to the incident. TN-575: Open Source Network Security Monitoring is a lab intensive environment with a cyber range that gives each student in-depth knowledge and practical experience monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls.

    Attendees to TN-575: Open Source Network Security Monitoring class will receive TechNow approved course materials and expert instruction.

    This Course is taught utilizing Security Onion or RockNSM as specified by the customer.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objective:

    The focus of this course is to present a suite of Open Source security products integrated into a highly functional and scalable Network Security Monitoring solution.

    Prerequisites:

    Students should have a basic understanding of networks, TCP/IP and standard protocols such as DNS, HTTP, etc. Some Linux knowledge/experience is recommended, but not required

    Course Outline:

    • Network Security Monitoring (NSM) Methodology
    • High Bandwidth Packet Capture Challenges
    • Installation of Security Onion
      • Use Cases (analysis, lab, stand-alone, distributed)
      • Resource Requirements
    • Configuration
      • Setup Phase I – Network Configuration
      • Setup Phase 2 – Service Configuration
      • Evaluation Mode vs. Configuration Mode
      • Verifying Services
    • Security Onion Architecture
      • Configuration Files and Folders
      • Network Interfaces
      • Docker Environment
      • Security Onion Containers
    • Overview of Security Onion Analyst Tools
      • Kibana
      • CapME
      • CyberChef
      • Squert
      • Sguil
      • NetworkMiner
    • Quick Review of Wireshark and Packet Analysis
      • Display and Capture Filters
      • Analyze and Statistics Menu Options
      • Analysis for Signatures
    • Analyzing Alerts
      • Replaying Traffic
      • 3 Primary Interfaces:
        • Squert
        • Sguil
        • Kibana
      • Pivoting Between Interfaces
      • Pivoting to Full Packet Capture
    • Snort and Surricata
      • Rule Syntax and Construction
      • Implementing Custom Rules
      • Implementing Whitelists and Blacklists
    • Hunting
      • Using Kibana to Slice and Dice Logs
      • Hunting Workflow with Kibana
    • Bro
      • Introduction and Overview
        • Architecture, Commands
      • Understanding and Examining Bro Logs
        • Using AWK, sort, uniq, and bro-cut
      • Working with traces/PCAPs
      • Bro Scripts Overview
        • Loading and Using Scripts
      • Bro Frameworks Overview
        • Bro File Analysis Framework FAF
      • Using Bro scripts to carve out more than files
    • RockNSM ( * If Applicable)
      •  Kafka
        • Installation and Configuration
        • Kafka Messaging
        • Brokers
        • Integration with Bro and FSF
      • File Scanning Framework FSF
        • Custom YARA Signatures
        • JSON Trees
        • Sub-Object Recursion
        • Bro and Suricata Integration
    • Elastic Stack
      • Adding new data sources in Logstash
      • Enriching data with Logstash
      • Automating with Elastalert
      • Building new Kibana dashboards
    • Production Deployment
      • Advanced Setup
      • Master vs Sensor
      • Node Types – Master, Forward, Heavy, Storage
      • Command Line Setup with sosetup.conf
      • Architectural Recommendations
      • Sensor Placement
      • Hardening
      • Administration
      • Maintenance
    • Tuning
      • Using PulledPork to Disable Rules
      • BPF’s to Filter Traffic
      • Spinning up Additional Snort / Suricata / Bro Workers to Handle Higher Traffic Loads

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers.  CGRC is crucial to the Management staff.

    This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.

    TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:

    • Security and Privacy Governance, Risk Management, and Compliance Program
    • Scope of the System
    • Selection and Approval of Framework, Security, and Privacy Controls
    • Implementation of Security and Privacy Controls
    • Assessment/ Audit of Security and Privacy Controls
    • System Compliance
    • Compliance Maintenance

    RMF Related Steps

    • Prepare – Process Initiation
    • Categorize Information Systems
    • Establish the Security Control Baseline
    • Apply Security Controls
    • Assess Security Controls
    • Authorize Information System
    • Monitor Security Controls

    TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.

    Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.

    Dates/Locations:

    Date/Time Event
    02/17/2026 - 02/20/2026
    08:00 -16:00
    TN-813: Certified in Governance, Risk and Compliance (CGRC)
    TechNow, Inc, San Antonio TX
    05/26/2026 - 05/29/2026
    08:00 -16:00
    TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    TechNow, Inc, San Antonio TX
    09/08/2026 - 09/11/2026
    08:00 -16:00
    TN-813: Certified in Governance, Risk and Compliance (CGRC)
    TechNow, Inc, San Antonio TX

    Duration: 3 Days

    Course Objectives:

    • Initiate the Preparation Phase
    • Perform Execution Phase
    • Perform Maintenance Phase
    • Understand the Purpose of Security Authorization

    Prerequisites:

    • IT Security
    • Information Assurance
    • Information Risk Management certification and systems administration
    • 1-2 years of general experience technical experience
    • 2 years of general systems experience
    • 1-2 years of Database/Systems Development/Network Experience
    • Information Security Policy Experience

    Comments

    Latest comments from students




    Liked the class?  Then let everyone know!