Course Overview:

Oracle Solaris 10 Trusted Extensions Installation, Configuration, and Administration provides students with the knowledge to enable, configure, and administer Solaris Trusted Extensions software on a system, running the Oracle Solaris 10 Operating System. The S-595: Oracle Solaris 10 Trusted Extensions Installation & Configuration teaches students how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers, and control privileges and authorizations.

Each attendee to S-595: Oracle Solaris 10 Trusted Extensions Installation & Configuration will receive TechNow approved course materials and extensive hands-on experience with Oracle Solaris 10.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Security Overview
  • Installing Solaris Trusted Extensions Software
  • Configuring Trusted Extensions Labels
  • Zones
  • Creating Roles and Users
  • Configuring LDAP for Trusted Extensions
  • Common Procedures

Prerequisites:

  • Understand data separation requirements in high security environments
  • Install and configure the Solaris 10 operating systems
  • Perform basic Solaris 10 operating systems
  • Solaris 10 ZFS Administration

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

Solaris 10 Security provides enterprise-class features to help you protect your applications and your data. Security Administrators can minimize and harden Oracle Solaris 10 to implement a secure foundation for deploying services. The Configuring Security on the Solaris 10 Operating System class provides students with the knowledge and skills to implement these features and customize security on Oracle Solaris 10 systems.

Attendees to S-395: Configuring Security on the Oracle Solaris 10 OS class will receive TechNow Approved Course materials and extensive hands-on experience with Solaris 10. 

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Solaris Security Services
  • Hardening Solaris Systems
  • System Protection with SMF
  • File System Security
  • Privileges and Role-Based Access Control
  • Pluggable Authentication Modules
  • Solaris Cryptographic Framework
  • Key Management Framework
  • Auditing
  • Solaris Network Security
  • Configuring and Using Trusted Extensions

Prerequisites:

  • Administer users, packages, and applications on Solaris 10 Systems
  • Administer networking and routing on Solaris 10 Systems
  • Describe basic system and network security concepts
  • Administer services and zones on Solaris 10 systems

Comments

Latest comments from students



Liked the class?  Then let everyone know!

Course Overview:

This seminar meets the objectives stated by the Federal Information Security Management Act (FISMA) where government agencies are being held accountable to ensure the protection of their information & information systems.  In order to meet the requirements of these important laws & mandates, agencies must take necessary steps to implement key information security standards.  Attend this program to gain the management skills & standards necessary to meet the requirements of these mandates.

Attendees to TN-802: Federal Information Security Management Act (FISMA) Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives:

  • Overview of current information security guidelines and requirements
  • Understand security terminology and identify employee roles
  • Information system within a performance framework
  • Step-By-Step walk-through of FISMA requirements & supporting guidance
    • Step 1: Categorizations Standards
    • Step 2: Mapping Guidelines
    • Step 3: Minimum Security Requirements
    • Step 4: Applying a Risk Management Framework
    • Step 5: Implement a System Security Plan
    • Step 6: Certification & Accreditation Application Workshop: Develop a Security Assessment Report

Prerequisites:

  • Basic computer literacy

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

This course is designed to assist in your exam preparation for the CISM exam.

Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
07/29/2024 - 08/02/2024
08:00 -16:00
TN-825: CISM
TechNow, Inc, San Antonio TX
10/28/2024 - 11/01/2024
08:00 -16:00
TN-825: CISM
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Information Security Governance (24%)
  • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
  • Information Risk Management (30%)
  • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
  • Information Security Program Development and Management (27%)
  • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
  • Information Security Incident Management (19%)
  • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

Prerequisites:

A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Comments

Latest comments from students


User: tracycampbell

Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

Facilities comments: The Home2Suites by Hilton was FANTASTIC!



Liked the class?  Then let everyone know!

Course Overview:

This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Systems Security Engineering
  • Certification and Accreditation
  • Technical Management
  • U.S. Government Information Assurance Governance

Prerequisites:

Comments

Latest comments from students


User: fsarisen

Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


User: storoy30

Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


Liked the class?  Then let everyone know?