Here are the General Unix course offerings:
Course Overview:
The System Administration I for Red Hat course is designed for IT professionals working to become full-time enterprise Linux system administrators. This course gives the student direct experience with the most essential system administration tasks in the Red Hat. You will be instructed in crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local disk devices, installation, package management, performing system boot procedures, grub and controlling system processes.
Attendees to RH-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Installation
- Manage File Systems and Local Disk Drives
- Perform Mounts and Unmounts
- Perform System Boot Procedures
- Tuning and Maintaining the Kernel
- Control System Processes
- Perform User Administration
- Installing and Managing Services
- Perform Package Administration
- Client Setup of SSH and Printing
Prerequisites:
Comments
Latest comments from students
User: mlspence
Instructor comments: Bill was awesome! He did a fantastic job teaching the course mater to everyone in the class. He made sure everyone was able to keep up and that they understood the material before moving on. Thanks!
Facilities comments: They were great as well
Liked the class? Then let everyone know!
Here are the Cisco Security course offerings:
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- TN-865: Wireshark Network Traffic and Security Analysis
Course Overview:
TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam. The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.
This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try. We encourage our students to take the exam within a week after course completion. The goal for this course is a pass rate of one and done. Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days. TechNow has a proven CISSP track record that you can depend on.
Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:
Duration: 10 Days
Course Objectives:
Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communications and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
Prerequisites:
To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:
- 4 years of experience in the information security field
- or 3 years experience & a college degree
Contact TechNow to verify that you qualify.
Comments
Latest comments from students
Facilities comments:
User: pulliamp
Instructor comments:
Liked the class? Then let everyone know!
Course Overview:
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- VoIP Architecture
- VoIP Signaling and media protocols
- Common VoIP authentication mechanisms
- Common VoIP encryption techniques
- VoIP protocol analysis with Wireshark
- Maintaining QoS while mitigating DoS
- VoXML, XML, and application integration security
- Converged network security design and implementation
- Impact of NAT and firewalls
- SIP, H.323, and MGCP vulnerabilities
- VPN, IPsec and SRTP to secure VoIP services
- Penetration testing with open source tools
- Attacks for Eavesdropping, call redirection, and DoS
- Design of hacked firmware virtualization layer
- Concise lockdown steps for network hardware and VoIP
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- As well as an understanding of TCP/IP
Comments
Latest comments from students