Here are the CompTIA Security course offerings:
Course Overview:
Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network. This course is heavily based on Kali and primarily on Metasploit. In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco. This course is 90% hacking, but defenses for demonstrated hacks will be discussed. If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.
Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Introduction to Pen Testing using the PTES model
- Metasploit Basics
- MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
- Intelligence Gathering
- Nmap, Databases in Metasploit, Port Scanning with Metasploit
- Quick Intro to Ruby
- Writing a simple Ruby script to create a custom scanner
- Vulnerability Scanning
- Importing Nessus Results
- Scanning with Nessus from Within Metasploit
- Exploitation
- Using the Metasploit Framework and console to exploit
- Meterpreter
- Compromising a Windows System
- Attacking MS SQL, xp_cmdshell
- Dumping Usernames and Passwords, extracting and dumping hashes
- Pass the Hash and Token Impersonation
- Pivoting
- Railgun
- Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
- Avoiding Detection
- Creating Stand-Alone Binaries with MSFpayload
- Encoding with MSFencode and Packers (go Green Bay:)
- Exploitation Using Client Side Attacks
- Introduction to Immunity Debugger
- Using Immunity Debugger to Decipher NOP Shellcode
- Metasploit Auxiliary Modules
- Social Engineer Toolkit (SET)
- Spear-Phishing, Web Attack
- Creating a Multipronged Attack
- Creating Your Own Module
- Adapt an existing Module
- Add some PowerShell and Run the Exploit
- Meterpreter Scripting
- Capture The Flag Exercise
Prerequisites:
- This is an advanced Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- An understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow provides an array of courses to meet our customer's requirements. Courses that do not fit into our major course categories and custom or specialized courses appear here.
Here are courses about specilaized Software or Hardware:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
- N-495: Voice-over IP (VoIP) Foundations
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
- RH-345: Red Hat JBoss Application Administration I
- TN-102: Writing Effective Requirements
- TN-205: A+ Skills Class
- TN-225: Network+ Skills Class
- TN-245: Telecommunications Fundamentals
- TN-395: Internet Protocol Version 6 (IPv6)
- TN-430: Elasticsearch Engineer (ELK)
- TN-801: Windows for Security Professionals
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-963: Windows Security Automation with PowerShell
- VM-315: VMware Infrastructure: Install, Configure, and Manage
- VM-325: VMware View: Install, Configure and Manage
The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must. TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development.
Here is a list of all of our Microsoft courses:
- AZ-204: Developing Solutions for Microsoft Azure
- AZ-400: Microsoft Azure DevOps Solutions
- AZ-500: Microsoft Azure Security Technologies
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
- DP-201: Designing an Azure Data Solution
- MS-10174: Configuring and Administering SharePoint 2010 and 2013
- MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010 & 2013
- MS-10231: Designing a Microsoft SharePoint 2010 and 2013 Infrastructure
- MS-2124: Programming with C#
- MS-5002: Introduction to SQL Databases
- MS-6231: Maintaining a Microsoft SQL Server Database
- MS-6232: Implementing a Microsoft SQL Server Database
- TN-323: SharePoint 2010 and 2013 for Project Management
- TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
- TN-5202: Microsoft SharePoint 2010 and 2013: Workflows and Designing InfoPath Forms
- TN-5305: Supporting and Troubleshooting Windows 11
- TN-5315: Configuring Windows Devices
- TN-5320: Microsoft Modern Desktop Administrator
- TN-5415: Installation, Storage, and Compute with Windows Server 2016
- TN-5425: Networking with Windows Server 2016
- TN-5455: Managing Windows Environments with Group Policy
- TN-765: Automating Administration with Windows Powershell
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell
Course Overview:
This is a hands-on course that covers many of the concepts of securing the perimeter of an organization. This includes concepts such as intrusion detection, packet filtering, and central logging.
A skills focus enables the student to better absorb the subject matter and perform better on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Firewalls.
This course is an excellent precursor to PA-215 Palo Alto Firewall Essentials FastTrack.
Attendees to TN-949: Certified Firewall Analyst Prep will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Analyzing Network and Wireless Design
- Creating and Auditing a Rulebase
- Firewall Assessment and Penetration Testing
- Host-Based Detection and DLP
- Incident Detection and Analysis
- IOS and Router Security
- IPv6 and ICMPv6
- Log Collection and Analysis
- NAT and Proxies
- Netfilter IPtables
- Network Access Control
- Network-Based Intrusion Detection
- Packet Filters and Inspection
- Packet Fragmentation
- Perimeter Concepts and IP Fundamentals
- Securing Hosts and Services
- TCP/IP Protocols
- VPN Design and Auditing
- VPN Implementation
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students