Course Overview:

This course provides students with the knowledge and skills to implement a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to implementing a database.

Attendees to MS-6232: Implementing a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Creating Databases and Databases Files
  • Creating Data Types and Tables
  • Creating and Tuning Indexes
  • Implementing Data Integrity by Using Constraints and Triggers
  • Using XML
  • Implementing Views
  • Implementing Stored Procedures
  • Implementing Functions
  • Implementing Managed Code in the Database
  • Managing Transactions and Locks
  • Using Service Broker

Prerequisites:

  • Basic knowledge of the Microsoft Windows operating system and its core functionality
  • Working knowledge of Transact-SQL
  • Working knowledge of relational databases
  • Some experience with database design

Comments

Latest comments from students


User: bangbangsplat

Instructor comments: some kind of presentation would have been helpful in learning the objectives of the course (PowerPoint, drawing on easel, etc.) It seemed like the instructor is not too familiar with the error codes we were receiving during the Practice Exams.

Facilities comments: preferred to have the location located in a less busy area of the city


User: smaxam

Instructor comments: Clay was very knowledgable but had to repeat questions a number of times to get his attention.

Facilities comments: Holiday Inn was nice


Liked the class?  Then let everyone know!

 

Course Overview:

Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Outline:

  • Identity and access
    • Configure Azure Active Directory for Azure workloads and subscriptions
    • Configure Azure AD Privileged Identity Management
    • Configure security for an Azure subscription
  • Platform Protection
    • Understand cloud security
    • Build a network
    • Secure network
    • Implement host security
    • Implement platform security
    • Implement subscription security
  • Security Operations
    • Configure security services
    • Configure security policies by using Azure Security Center
    • Manage security alerts
    • Respond to and remediate security issues
    • Create security baselines
  • Data and Applications
    • Configure security policies to manage data
    • Configure security for data infrastructure
    • Configure encryption for data at rest
    • Understand application security
    • Implement security for application lifecycle
    • Secure applications
    • Configure and manage Azure Key Vault

Prerequisites :

      • AZ-900: Microsoft Azure Fundamentals
      • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
      • Student must be able to program in an Azure Supported Language.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Course Overview:

The System Administration I for Red Hat course is designed for IT professionals working to become full-time enterprise Linux system administrators. This course gives the student direct experience with the most essential system administration tasks in the Red Hat. You will be instructed in crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local disk devices, installation, package management, performing system boot procedures, grub and controlling system processes.

Attendees to RH-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Installation
  • Manage File Systems and Local Disk Drives
  • Perform Mounts and Unmounts
  • Perform System Boot Procedures
  • Tuning and Maintaining the Kernel
  • Control System Processes
  • Perform User Administration
  • Installing and Managing Services
  • Perform Package Administration
  • Client Setup of SSH and Printing

Prerequisites:

Comments

Latest comments from students


User: mlspence

Instructor comments: Bill was awesome! He did a fantastic job teaching the course mater to everyone in the class. He made sure everyone was able to keep up and that they understood the material before moving on. Thanks!

Facilities comments: They were great as well



Liked the class?  Then let everyone know!

 

Course Overview: 

This class uses a sample product development initiative to illustrate the course principles.  If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course will cover the Agile adaptive life cycle framework and all of the ceremonies, artifacts, and roles.

Attendees to PM-222: Agile Principles using will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Compare the Agile (adaptive) and Plan Driven (predictive/ waterfall) approaches
  • Understand the Agile Manifesto and SCRUM Framework
  • Apply the basics of Agile / SCRUM Team Organization, with importance of the Development Team responsibilities
  • Use Agile / SCRUM chartering, high-level estimating, and prioritization techniques to initiate a Product Roadmap and a Product Backlog
  • Create personas and user stories to lead to Development Team task assignments
  • Understand Release and Sprint Planning to lead to the Sprint Backlog
  • Plan and conduct a sample SCRUM Sprint from the Vision Statement through the Sprint retrospective

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

Duration: 5 Days

Audience:

Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

Course Prerequisites:

We recommend that attendees of this course have the following prerequisite:
• Network+

Dates/Locations: No Events

Course Outline:

DAY ONE

Course Set Up and Analyzer Testing

Network Analysis Overview
Wireshark Functionality Overview
Capturing Wired and Wireless Traffic
Define Global and Personal Preferences for Faster Analysis
Defined Time Values and Interpret Summaries
Interpret Basic Trace File Statistics to Identify Trends
Create and Apply Display Filters for Efficient Analysis

DAY TWO

Follow Streams and Reassemble Data
Use Wireshark’s Expert System to Identify Anomalies
TCP/IP Analysis Overview
Analyze Common TCP/IP Traffic Patterns

DAY THREE

Graph I/O Rates and TCP Trends
802.11 (WLAN) Analysis Fundamentals
Voice over IP (VoIP) Analysis Fundamentals
Network Forensics Fundamentals

DAY FOUR

Detect Scanning and Discovery Processes
Analyze Suspect Traffic

DAY FIVE

Use Command‐Line Tools

Next/Related Courses: