TechNow offers many courses that also have a related certification exam.  As an Authorized Peason VUE testing center, we offer exams for many certifications.  Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.

in   
 

Course Overview:

TechNow's CISSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Information Systems Security Professional exam.  The exam covers (ISC)²'s 8 Domains from the Common Body of Knowledge, which encompass the whole of information security.

This course is an intense 10 day program that ensures the student passes the CISSP exam on the first try.  We encourage our students to take the exam within a week after course completion.  The goal for this course is a pass rate of one and done.  Our high pass rate reflects the dedication of TechNow's students and our commitment to a ten day program that many in the industry do in 5 days.  TechNow has a proven CISSP track record that you can depend on.

Attendees to TN-815: CISSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

 

Unix Course Flow

Dates/Locations:

Date/Time Event
06/17/2024 - 06/28/2024
08:00 -16:00
TN-8150: CISSP Certification Preparation Seminar
TechNow, Inc, San Antonio TX
09/09/2024 - 09/20/2024
08:00 -16:00
TN-8150: CISSP Preparation Seminar
TechNow, Inc, San Antonio TX
12/02/2024 - 12/13/2024
08:00 -16:00
TN-8150: CISSP Certification Preparation Seminar
TechNow, Inc, San Antonio TX

Duration: 10 Days

Course Objectives:

Our CISSP Professional training program covers the 8 Domains of the CBK in-depth with an emphasis on rigorous exam preparation.

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security) 

Prerequisites:

To qualify for this CISSP training program you must first qualify for the CISSP exam, which requires:

  • 4 years of experience in the information security field
  • or 3 years experience & a college degree 

Contact TechNow to verify that you qualify.

Comments

Latest comments from students


Facilities comments:


User: pulliamp

Instructor comments:


Liked the class?  Then let everyone know!

Course Overview:

This course provides students with the knowledge and skills to install, deploy, and upgrade to Windows 7.  Additionally, students should be able to configure pre-installation and post-installation system settings, Windows security features, network connectivity applications included with Windows 7, and mobile computing. Students should also be able to maintain systems, including monitoring for and resolving performance and reliabilty issues. This course maps to Microsoft's 50322 course and aids in preparation for the 70-680 exam.

Attendees to TN-5005: Windows 7, Configuring Technology Specialist Course will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Windows 7
  • Installing Windows 7
  • Upgrading to Windows 7
  • Deploying Windows 7
  • Configuring Hardware in Windows 7
  • Configuring Network in Windows 7
  • Configuring Backup and Recovery Options
  • Remote Managements in Windows 7

Prerequisites:

  • A+ certification or equivalent knowledge
  • Network+ certification or equivalent knowledge
  • Basic Understanding of Windows PowerShell syntax
  • At least one year experience in IT field, particularly in IT support and administrator area

Comments

Latest comments from students


Liked the Class?  Then let everyone know!

  

Course Overview: 

Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Pen Testing using the PTES model
  • Metasploit Basics
    • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
  • Intelligence Gathering
    • Nmap, Databases in Metasploit, Port Scanning with Metasploit
  • Quick Intro to Ruby
    • Writing a simple Ruby script to create a custom scanner
  • Vulnerability Scanning
    • Importing Nessus Results
    • Scanning with Nessus from Within Metasploit
  • Exploitation
    • Using the Metasploit Framework and console to exploit
  • Meterpreter
    • Compromising a Windows System
    • Attacking MS SQL, xp_cmdshell
    • Dumping Usernames and Passwords, extracting and dumping hashes
    • Pass the Hash and Token Impersonation
    • Pivoting
    • Railgun
    • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
  • Avoiding Detection
    • Creating Stand-Alone Binaries with MSFpayload
    • Encoding with MSFencode and Packers (go Green Bay:)
  • Exploitation Using Client Side Attacks
    • Introduction to Immunity Debugger
    • Using Immunity Debugger to Decipher NOP Shellcode
  • Metasploit Auxiliary Modules
  • Social Engineer Toolkit (SET)
    • Spear-Phishing, Web Attack
    • Creating a Multipronged Attack
  • Creating Your Own Module
    • Adapt an existing Module
    • Add some PowerShell and Run the Exploit
  • Meterpreter Scripting
  • Capture The Flag Exercise

Prerequisites:

  • This is an advanced  Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • An understanding of TCP/IP

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

  

Course Overview:

This course covers all aspects of installing, configuring, tuning and administering Orion Network Performance Monitor, its Modules including Server and Application Monitor and integration with the SolarWinds Engineers Toolset.

Duration:  5 Days

Prerequistites: It is expected that delegates are familiar with basic networking concepts and terminology.

Course Objectives:

  • Understand SNMP, its versions and operation including MIBs and OIDs
  • Understand the components of Orion and its licensing model
  • Install Orion NPM, APM, IPAM, NCM, NTA, IPSLA, UDT & SEUM
  • Perform discovery, import data and manage information gathering
  • Manage Accounts and Views
  • Interpret chart data
  • Configure and run reports
  • Configure Alerting
  • Troubleshoot issues and identify resolutions
  • Tune system for optimum performance

Course Outline:  

Day 1

  • Introductions
  • Installation of Orion NPM
  • SNMP, MIBs, OIDs
  • Network Discovery & Node Management
  • Web Server Configuration, Charts, Network Atlas, Accounts and Views
  • Custom properties, Groups and Dependencies

Day 2

  • Universal Device Pollers, Alerting & Reporting
  • Syslog & Traps
  • Tuning Orion

Day 3

  • NetFlow Traffic Analyzer
  • Application Performance Monitor (incl. WMI)
  • IP Address Manager

Day 4

  • Network Configuration Manager
  • IPSLA
  • User Device Tracker
  • Synthetic End User Monitor
Day 5
  • Server and Application Monitor
  • Network Topology Mapper

 

Comments

Latest comments from students


User: daskey

Instructor comments: Bill did a great job. Labs were integrated with a lot of hardware and the TechNow Cyber Range represented great scenarios for working with Solarwinds!



  

Dates/Locations: No Events