Course Overview

This hands-on course focuses on configuration of the JUNOS firewall/virtual private network (VPN) products.  Through lecture and extensive labs, you will gain confidence in this product.

Attendees to TN-613: Configuring Juniper Networks SRX Firewall and VPN will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 3 Days

Course Objectives:

  • Explain the Juniper Networks security architecture.
  • Configure administrative access and options.
  • Back up and restore configuration and JUNOS files.
  • Configure a JUNOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.
  • Discuss the applications of multiple virtual routers.
  • Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.
  • Configure advanced policy options.
  • Identify and configure network designs for various types of network address translation.
  • Configure policy-based and route-based VPN tunnels.

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

  

Course Overview: 

Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-515: Implementing Cybersecurity and Information Assurance Methodologies class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it, utilizing a mixed-platform target environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

Attendees to TN-515: Implementing Cybersecurity and Information Assurance Methodologies Class Attendees will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Introduction to Pen Testing using the PTES model
  • Metasploit Basics
    • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
  • Intelligence Gathering
    • Nmap, Databases in Metasploit, Port Scanning with Metasploit
  • Quick Intro to Ruby
    • Writing a simple Ruby script to create a custom scanner
  • Vulnerability Scanning
    • Importing Nessus Results
    • Scanning with Nessus from Within Metasploit
  • Exploitation
    • Using the Metasploit Framework and console to exploit
  • Meterpreter
    • Compromising a Windows System
    • Attacking MS SQL, xp_cmdshell
    • Dumping Usernames and Passwords, extracting and dumping hashes
    • Pass the Hash and Token Impersonation
    • Pivoting
    • Railgun
    • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
  • Avoiding Detection
    • Creating Stand-Alone Binaries with MSFpayload
    • Encoding with MSFencode and Packers (go Green Bay:)
  • Exploitation Using Client Side Attacks
    • Introduction to Immunity Debugger
    • Using Immunity Debugger to Decipher NOP Shellcode
  • Metasploit Auxiliary Modules
  • Social Engineer Toolkit (SET)
    • Spear-Phishing, Web Attack
    • Creating a Multipronged Attack
  • Creating Your Own Module
    • Adapt an existing Module
    • Add some PowerShell and Run the Exploit
  • Meterpreter Scripting
  • Capture The Flag Exercise

Prerequisites:

  • This is an advanced  Cybersecurity and Information Assurance Course which requires basic Windows & UNIX competency
  • Certification or 2 years of experience in these operating systems is highly recommended
  • An understanding of TCP/IP

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

  

Course Overview:

This course covers all aspects of installing, configuring, tuning and administering Orion Network Performance Monitor, its Modules including Server and Application Monitor and integration with the SolarWinds Engineers Toolset.

Duration:  5 Days

Prerequistites: It is expected that delegates are familiar with basic networking concepts and terminology.

Course Objectives:

  • Understand SNMP, its versions and operation including MIBs and OIDs
  • Understand the components of Orion and its licensing model
  • Install Orion NPM, APM, IPAM, NCM, NTA, IPSLA, UDT & SEUM
  • Perform discovery, import data and manage information gathering
  • Manage Accounts and Views
  • Interpret chart data
  • Configure and run reports
  • Configure Alerting
  • Troubleshoot issues and identify resolutions
  • Tune system for optimum performance

Course Outline:  

Day 1

  • Introductions
  • Installation of Orion NPM
  • SNMP, MIBs, OIDs
  • Network Discovery & Node Management
  • Web Server Configuration, Charts, Network Atlas, Accounts and Views
  • Custom properties, Groups and Dependencies

Day 2

  • Universal Device Pollers, Alerting & Reporting
  • Syslog & Traps
  • Tuning Orion

Day 3

  • NetFlow Traffic Analyzer
  • Application Performance Monitor (incl. WMI)
  • IP Address Manager

Day 4

  • Network Configuration Manager
  • IPSLA
  • User Device Tracker
  • Synthetic End User Monitor
Day 5
  • Server and Application Monitor
  • Network Topology Mapper

 

Comments

Latest comments from students


User: daskey

Instructor comments: Bill did a great job. Labs were integrated with a lot of hardware and the TechNow Cyber Range represented great scenarios for working with Solarwinds!



  

Dates/Locations: No Events

 

  

Course Overview:

The purpose of this course is to teach students the basic fundamentals of networking, security, and server administration with Windows Server 2012. It is intended to provide the foundational knowledge needed to begin building a career in Microsoft Technologies.

The course leads directly to preparing for the MCITP: Server Manager certification exam 70-410.  It also maps to Microsoft's course 20410B, and is part of the MCSA and MCSE sequence of courses TN-5215 (Microsoft 20410B), TN-5225 (Microsoft 20411B), TN-5235 (Microsoft 20412B), TN-5245 (Microsoft 20413B), TN-5255 (Microsoft 20414B).

Attendees to TN-5215: Installing and Configuring Windows Server 2012 will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Install and Configure Windows Server 2012.
  • Describe AD DS.
  • Manage Active Directory objects.
  • Automate Active Directory administration.
  • Implement IPv4.
  • Implement Dynamic Host Configuration Protocol (DHCP).
  • Implement Domain Name System (DNS).
  • Implement IPv6.
  • Implement local storage.
  • Share files and printers.
  • Implement Group Policy.
  • Use Group Policy Objects (GPOs) to secure Windows Servers.
  • Implement server virtualization using Hyper-V.

Prerequisites:

  • A good fundamental knowledge of general computing equivalent with the CompTIA A+ Certification
  • An ability to understand basic security, networking and administration concepts
  • Some previous knowledge and experience with desktop operating systems, although this is not mandatory

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

Course Overview:

This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field.  Assessors and Auditors have to face many technologies that are not part of the main stream.  TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures.  Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system.  Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.

Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF.  TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements.  TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security.  Cross Domain overlays are presented that fits the work flow of an assesor.  PII overlays and any overlays that an organization uses and can be made available are also presented.  

This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503.  Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance.  ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program.  TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency.  TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.

More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively.  The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies.  Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).

TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.

A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls.  Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered.  This course is not theory or death by power point.  Real scenarios are presented as exercises.  A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Establish a baseline of RMF knowledge
  • Validate essential security controls, programs, and metrics
  • DoD DCD 6/3 to ICD 503 Transition
  • Lab Environtment and the Cyber Range
  • Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
  • Risk Assessment Report (RAR)
  • Systems Security Plan (SSP)
  • Security Assessment Report (SAR)
  • Plans of Action and Milestone (POAM)

Prerequisites:

Experience in the field of auditing and assesments.

Comments

Latest comments from students


Liked the class?  Then let everyone know!