Here are our Microsoft Programming courses:
Course Overview:
This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform. The course focuses on C# program structure, language syntax & implementation details. C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++. It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.
Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of the Microsoft .NET Platform Overview of C#
- Using Value-Type Variables
- Statements & Exceptions
- Methods & Parameters
- Arrays
- Essentials of Object-Oriented Programming
- Using Reference-Type Variables
- Creating & Destroying Objects
- Inheritance in C#
- Aggregation, Namespaces & Advanced Scope
- Operators & Events Properties & Indexes
- Attributes
Prerequisites:
- Experience with programming in C, C++, Visual Basic, Java or another programming language
Comments
Latest comments from students
User: jdmccol
Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.
Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.
Liked the class? Then let everyone know!
Course Overview:
This course will be fast paced with in-depth and live demonstrations.
Date/Locations:
Duration: 1 day
Course Objectives:
- AIDE
- DNS Security with DNSsec
- Logging and Audit Management
- Linux Security Modules and SE-Linux
- Linus Containers (Jailing Services and Apps)
- SSH and SSL tunneling
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
-
-
- 2+ years of proven information security work experience
- Educational background with digital security specialization
Target Audience:
-
- Law Enforcement
- Defense & Military
- E-Business Security
- Systems Administrators
- Legal Professionals
- Banking & Insurance professionals
- Government Agencies
- IT Managers
-
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This is a hands-on course that covers many of the concepts of securing the perimeter of an organization. This includes concepts such as intrusion detection, packet filtering, and central logging.
A skills focus enables the student to better absorb the subject matter and perform better on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Firewalls.
This course is an excellent precursor to PA-215 Palo Alto Firewall Essentials FastTrack.
Attendees to TN-949: Certified Firewall Analyst Prep will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Analyzing Network and Wireless Design
- Creating and Auditing a Rulebase
- Firewall Assessment and Penetration Testing
- Host-Based Detection and DLP
- Incident Detection and Analysis
- IOS and Router Security
- IPv6 and ICMPv6
- Log Collection and Analysis
- NAT and Proxies
- Netfilter IPtables
- Network Access Control
- Network-Based Intrusion Detection
- Packet Filters and Inspection
- Packet Fragmentation
- Perimeter Concepts and IP Fundamentals
- Securing Hosts and Services
- TCP/IP Protocols
- VPN Design and Auditing
- VPN Implementation
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students