Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must. TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development.
Here is a list of all of our Microsoft courses:
- AZ-204: Developing Solutions for Microsoft Azure
- AZ-400: Microsoft Azure DevOps Solutions
- AZ-500: Microsoft Azure Security Technologies
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
- DP-201: Designing an Azure Data Solution
- MS-10174: Configuring and Administering SharePoint 2010 and 2013
- MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010 & 2013
- MS-10231: Designing a Microsoft SharePoint 2010 and 2013 Infrastructure
- MS-2124: Programming with C#
- MS-5002: Introduction to SQL Databases
- MS-6231: Maintaining a Microsoft SQL Server Database
- MS-6232: Implementing a Microsoft SQL Server Database
- TN-323: SharePoint 2010 and 2013 for Project Management
- TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
- TN-5202: Microsoft SharePoint 2010 and 2013: Workflows and Designing InfoPath Forms
- TN-5305: Supporting and Troubleshooting Windows 11
- TN-5315: Configuring Windows Devices
- TN-5320: Microsoft Modern Desktop Administrator
- TN-5415: Installation, Storage, and Compute with Windows Server 2016
- TN-5425: Networking with Windows Server 2016
- TN-5455: Managing Windows Environments with Group Policy
- TN-765: Automating Administration with Windows Powershell
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell
Course Overview:
TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI. This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .
TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams. Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI. As with many advanced TechNow security courses, there is a large hands-on ratio. This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries. CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.
This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. . MDT puts us close the mission and helps define the internal context to be analyzed against the CTI. TechNow pushes the student to truly understand how to think about and use CTI to make a difference.
Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Learn to comprehend and develop complex scenarios
- Identify and create intelligence requirements through practices such as threat modeling
- Utilize threat modeling to drive intelligence handling and practices
- Breakdown tactical, operational, and strategic-level threat intelligence
- Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
- How to collect adversary information creating better value CTI
- How to filter and qualify external sources, mitigating low integrity intelligence
- Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
- Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
- Breaking down threats mapped against their tradecraft to tweak IOCs
- Establish structured analytical techniques to be successful in any security role
- Learn and apply structured principles in support of CTI and how to communicate that to any security role.
Course Prerequisites:
- Security+, or equivalent experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow,Inc is an Accredited Training Center. As an ATC we are authorized to conduct EC-Council curriculum courses. Students will receive official EC-Council Curriculum and access to iLabs and when applicable access to EC-Council Cyber Range.

Here are the EC-Council course offerings:
