Course Overview:

A skills focus enables the student to better absorb the subject matter and perform successfully on the exam.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.

Attendees to TN-939:  Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 9 days

Course Objectives:

  • Backdoors & Trojan Horses
  • Buffer Overflows
  • Covering Tracks: Networks
  • Covering Tracks: Systems
  • Denial of Service Attacks
  • Exploiting Systems Using Netcat
  • Format String Attacks
  • Incident Handling Overview and Preparation
  • Incident Handling Phase 2: Identification
  • Incident Handling Phase 3: Containment
  • Incident Handling: Recovering and Improving Capabilities
  • IP Address Spoofing
  • Network Sniffing
  • Password Attacks
  • Reconnaissance
  • Rootkits
  • Scanning: Host Discovery
  • Scanning: Network and Application Vulnerability scanning and tools
  • Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
  • Scanning: Service Discovery
  • Session Hijacking, Tools and Defenses
  • Types of Incidents
  • Virtual Machine Attacks
  • Web Application Attacks
  • Worms, Bots & Bot-Nets

Prerequisites:

  • GSEC or equivalent experience
  • UNIX, Windows, Networking, and Security Experience
  • This is a hands-on skill course requiring comfort with command line interaction and network communications

Comments

Latest comments from students


User: m_jurrens

Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.


User: natebonds

Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.

Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.


Liked the class?  Then let everyone know!

Course Overview:

This course, TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs), covers the two main objectives for those entering the wireless world, understanding the technology & addressing its security.  TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) takes advantage of the student’s existing expertise to provide a challenging introductory course. Covering a broad range of wireless networking topics & an introduction on how to secure a wireless LAN from hackers. To insure wireless availability you need to understand proper design choices & administration practices. To protect valuable information on your network you need to know how attacks occur & techniques used to secure your wireless network.

Attendees to TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Radio Frequency (RF) Fundamentals
  • Spread Spectrum Technologies
  • 802.11 Network Architecture
  • Physical & MAC Layers
  • Hardware Installation, Configuration, & Management
  • Antennas & Accessories
  • Wireless Network Management
  • Troubleshooting Wireless LANs
  • Site Surveying
  • Wireless LAN Security
  • Organizations & Standards

Prerequisites:

Attendees should have network administration skills.  These skills can be obtained through TechNow’s N-205N-305: CCNA/ICND Training program or our highly respected cross platform TN-385: TCP/IP Analysis & Implementation course.

Comments

Latest comments from students


User: TMPRIESTLEY

Instructor comments: The instructor was very well versed on the topic and knew how to apply it to real-life examples. He led the labs and was very excited about the topic which kept the interest of myself and other class members. Sometimes his volume level was a little high- however the room the class was in was very small. Too small for a big personality!

Facilities comments: I was unaware of the facility changes, but that was at no fault of anyone since I was a drop-in for the course. They were very helpful and quick to mediate the issue.


Liked the class?  Then let everyone know!

 

Pearson VUE Testing

As a Pearson VUE Authorized Testing Center, TechNow can provide testing at the end of our certification preparation classes.  This method of testing folllowing the completion of a course allows for a higher pass rate.  Doing so, we have improved the level of experience in our testing system throughout the years.

At TechNow, we are equipped to provide testing for Pearson VUE exams ultimately anywhere.  As a mobile testing center, TechNow can schedule an exam at our office or can even bring the testing center to you.  We offer exams for many clients such as EC Council, GIAC, Cisco, and CompTIA.

TechNow's Certification Courses

 

Below is a list of some of TechNow's courses that we commonly offer exams for:   

 

CT-205: A+ Certification Course

CT-208: A+ Extended Boot Camp

CT-210: Project+

CT-225: Network+

CT-245: Linux+

CT-325: Security+

N-205: Interconnecting Cisco Network Devices I (ICND1)

N-305: Interconnecting Cisco Network Device II (ICND2)

N-310: CCNA Bootcamp

TN-425: Certified Ethichal Hacker (CEH)

TN-929: GIAC Security Essentials (GSEC) Training Course

TN-939: GIAC Hacker Techniques, Exploits, and Incident Handling (GCIH)

TN-949: GIAC Certified Firewall Analyst (GCFW)

TN-959: GIAC Certified Unix Security Administrator (GCUX)

TN-969: GIAC Certified Windows Security Administrator (GCWN)

TN-979: GIAC Certified Intrusion Analysist (GCIA)

TN-989: GIAC Advanced Penetration Testing, Exploits, and Ethical Hacking (GXPN)

TN-999: GIAC Reverse Engineering Malware (GREM)

 

If you have any questions in regars to general information about exams or exam scheduling please contact us at (210)733-1093 or (800)324-2294.

 

Thank You!

TechNow Staff

 
TechNow has been involved in enterprise security architectures and education since 1990.  TechNow’s training program has followed the evolution of enterprise computing into security architectures.  Palo Alto Networks represents the current state of security product evolution.  With next generation firewall technology, the reunification of your security architecture is possible.  TechNow can present the ramifications of many centralized strategies.  All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
Palo Alto Networks Certifications:  Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take  EDU-201 + EDU-205 + EDU-221
TechNow is a mobile Pearson VUE Authorized Testing Center.  Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course.  Take the course and get certfied, without  logistical effort of getting students to a training facility and the hassle of scheduling testing.
TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
in   

TechNow Hosts Linux Security Seminar

TechNow will be hosting a Linux Security Seminar March 15th.  With 23 years of UNIX/Linux security consulting and training, we are ready to help you get CompTIA continuing education credits, and keep it interesting!  The Seminar covers six topics: AIDE, DNSsec, Logging & Auditing, Linux Security Modules & SE-Linux, Linux Containers, and Tunneling.  The seminar will have hands-on live demonstrations of all topics.  We will take a few paragraphs to write a little about DNSsec, and look forward to seeing you in the security seminar.  DNSsec is a Federal Mandate and organizations have been moving rapidly into compliance.

DNSsec

Falsification of IP addressing has long been a thorn in the side of networked systems.  Spoofing of IP addressing has many attack vectors, but one of the most effective mechanisms has been DNS cache poisoning.

  • DNSsec DNS servers sign all their information (zone data) cryptographically.
  • Recursing or caching DNS servers can check the signatures of all signed zones (domains) they come across.
  • Current generation of Microsoft Windows support DNSsec in addition the many Linux/UNIX variants.
  • You administer your own DNS zones, you can sign your own zones and publish your certificates and signatures.

DNSsec is a Public Key Infrastructure (PKI) for DNS zone data, is an incredibly cost effective mechanism to manage PKI and can be used for applications.  No longer does an organization have to pay for certificates to a public certifying authority like Verisign or Thawte.  When a zone administrator digitally signs all of the different types of Resource Records (RRs) in a given zone, and publishes those signatures and the zone's signing key's public certificate, it then becomes possible for any recursing name server that makes queries against that zone to validate those signatures and, therefore, to have cryptographic proof that the answer to a given DNS query hasn't been forged or tampered with.

DNSsec provides a simple "chain of validation", all the way from the zone I really want to validate (lackland.af.mil or  redmond.microsoft.com or raleigh.redhat.com), all the way up to the root domain.  What if the parent domain isn't signed?  The "chain of validation" becomes broken, so the Internet Software Consortium (maintainers of BIND the original DNS implementation), maintain a DNS Look-aside Validation (DLV) database of keys for zones having precisely this sort of gap in their chains of validation.

DNSsec is very easy to implement and works great!  The seminar will provide attendees a great opportunity to ask questions, and see live demonstrations to answer those questions.

If you are interested in registering for the Linux for Security Professionals seminar please do so as soon as possible; registration will be held on first come first served basis and will end on March 08, 2013.

For more information about the seminar and registration process please visit the link below.

Linux for Security Professionals Seminar and Registration

For more detailed information and scheduling of our courses check out our website:

https://www.technow.com/

Very Respectfully,

TechNow Staff