Course Overview:
The introduction to SQL Databases training course is designed to train the learners on the fundamentals of database concepts. You will not only learn about the different types of databases, the languages and designs as well as describe important database concepts using SQL Server 2016. Anyone who is moving into a database role will benefit from taking this course.
Attendees to MS-5002: Introduction to SQL Databases will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 2 days
Comments
Latest comments from students
Liked the class? Then let everyone know!

Course Overview:
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.
What’s Included:
- 5 days of instructor led in classroom training
- Labs
- PenTest+ Courseware
- Exam Voucher
- PenTest+ onsite exam scheduling
Course Objectives:
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conduct active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test application
- Complete post-exploit tasks
- Analyze and report pen test results
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Planning and Scoping Penetration Tests
- Module 02. Conducting Passive Reconnaissance
- Module 03. Performing Non-Technical Tests
- Module 04. Conducting Active Reconnaissance
- Module 05. Analyzing Vulnerabilities
- Module 06. Penetrating Networks
- Module 07. Exploiting Host-Based Vulnerabilities
- Module 08. Testing Applications
- Module 09. Completing Post-Exploit Tasks
- Module 10. Analyzing and Reporting Pen Test Results
Prerequisites:
-
-
- CT-225: Network+
- CT-325: Security+
- 3-4 years of hands-on information security or related experience
-
Target Audience:
This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.
Liked the class? Then let everyone know!
The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must. TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development.
Here is a list of all of our Microsoft courses:
- AZ-204: Developing Solutions for Microsoft Azure
- AZ-400: Microsoft Azure DevOps Solutions
- AZ-500: Microsoft Azure Security Technologies
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
- DP-201: Designing an Azure Data Solution
- MS-10174: Configuring and Administering SharePoint 2010 and 2013
- MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010 & 2013
- MS-10231: Designing a Microsoft SharePoint 2010 and 2013 Infrastructure
- MS-2124: Programming with C#
- MS-5002: Introduction to SQL Databases
- MS-6231: Maintaining a Microsoft SQL Server Database
- MS-6232: Implementing a Microsoft SQL Server Database
- TN-323: SharePoint 2010 and 2013 for Project Management
- TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
- TN-5202: Microsoft SharePoint 2010 and 2013: Workflows and Designing InfoPath Forms
- TN-5305: Supporting and Troubleshooting Windows 11
- TN-5315: Configuring Windows Devices
- TN-5320: Microsoft Modern Desktop Administrator
- TN-5415: Installation, Storage, and Compute with Windows Server 2016
- TN-5425: Networking with Windows Server 2016
- TN-5455: Managing Windows Environments with Group Policy
- TN-765: Automating Administration with Windows Powershell
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell