Course Overview:

The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Implement network settings to provide a secure wireless network infrastructure
  • Implement a secure wireless client and troubleshoot wireless client connectivity issues
  • Implement and troubleshoot QoS in wireless networks
  • Implement and troubleshoot advanced capabilities in wireless network services

Prerequisites:

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

An in-depth course on how to use and configure Cisco Firepower Threat Defense technology,  from device setup and configuration and including routing, high availability, Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).  Students implement advanced Next Generation Firewall (NGFW) and Next Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network based malware detection, and deep packet inspection.
Students will also learn how to configure site to site VPN, remote access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.  This course combines lecture materials and hands on labs throughout to make sure that students are able to successfully deploy and manage the Cisco Firepower system.

It is a five-day instructor-led course that is aimed at providing network security engineers with the knowledge and skills that are needed to implement and maintain perimeter solutions that are based on Cisco Firepower security appliances. At the end of the course, students will be able to reduce risk to their IT infrastructure and applications using Cisco Firepower security appliance features, and provide detailed operations support for the Firepower appliance.

Attendees to N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Understand Sourcefire, Firepower 6.2, FireAMP, and Firepower Threat Defense (FTD)
  • Configure the Firepower Management Center (FMC)
  • Raise you confidence managing the Firepower Manager and Firepower tThreat Defense (FTD)
  • Describe the Cisco Firepower Systems infrastructure
  • Navigate the user interface and administrative features of the Cisco Firepower 6.2 system, including advanced analysis and reporting functionality to properly assess threats
  • Describe the System Configuration and Health policies and implement them
  • Describe the role Network Discovery (Firepower) technology plays in the Cisco devices
  • Describe, create, and implement objects for use in Access Control policies
  • Create DNS and URL policies and configure Sinkholes
  • Configure FTD policies such as Platform, Routing, Interface, Zones, PreFilter, QoS, NAT and Flex Config!
  • Describe advanced policy configuration and Firepower system configuration options
  • Configure Malware Policies to find and stop Malware
  • Understand Security Intelligence, and how to configure SI to stop attacks NOW!
  • Configure policies to find and stop Ransomware
  • Understand how to fine tune IPS policies
  • Understand how to find tun Snort Preprocessor policies (NAP)
  • Configure Correlation events, white rules, traffic profiles and create respective events and remediate them
  • Analyze events
  • Create reporting templates and schedule them
  • Configure backups, rule updates, Firepower Recommendations, URL updates, and more to run every week automatically
  • Set up external authentication for users using LDAP/Realms
  • Configuring system integration, realms, and identity sources
  • Configure FMC domains and implement them
  • Configure FTD HA with two FTD devices
  • SSL Policy – decrypt your traffic
  • AnyConnect and Site-to-Site VPN
  • Understand network and host based AMP.  Configure and analyze host based AMP
  • Understand Cisco Identity Services Engine (ISE)
  • Configure ISE and integrate with Cisco FMC identity policy using PxGrid

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.  Let us help you prepare for the CompTIA Security+ exam (SY0-701).

TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.

Attendees to CT-325: Security+ will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
05/20/2024 - 05/24/2024
00:00 -23:59
CT-325: Security+
TechNow, Inc, San Antonio TX
07/29/2024 - 08/02/2024
00:00 -23:59
CT-325: Security+
TechNow, Inc, San Antonio TX
09/30/2024 - 10/04/2024
08:00 -16:00
CT-325: Security+
TechNow, Inc, San Antonio TX
12/09/2024 - 12/13/2024
00:00 -23:59
CT-325: Security+
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Compare and contrast attacks
  • Compare and contrast security controls
  • Use security assessment tools
  • Explain basic cryptography concepts
  • Implement a public key infrastructure
  • Implement identity and access management controls
  • Manage access services and accounts
  • Implement a secure network architecture
  • Install and configure security appliances
  • Install and configure wireless and physical access security
  • Deploy secure host, mobile, and embedded systems
  • Implement secure network access protocols
  • Implement secure network applications
  • Explain risk management and disaster recovery concepts
  • Describe secure application development concepts
  • Explain organizational security concepts

Prerequisites:

  • CompTIA A+ and Network+ certifications, or equivalent knowledge.
  • Windows 7/8/10 and Server 2008/2012/2016 experience required.
  • Six to nine months experience in networking, including experience in configuring & managing TCP/IP.

Comments

Latest comments from students


User: joshjepsen@hotmail.com

Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.



 

Liked the class?  Then let everyone know!

Happy Veterans Day!

TechNow would like to honor and remember all those who have served and sacrificed for our country.  We would also like to give a big Thank You to all the men and women who are still serving and fighting for our Country today!

New Courses Offered!

We are now offering a variety of new specialized courses!  The following of which are featured:

RH-245: Linux System Administrator I: This course gives direct experience with the most essential system administration tasks in RedHat. The course also instructs crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local devices, installation, package management, performing system boot procedures, grub and controlling system processes.
RH-245: Linux System Administrator I

RH-295: Linux System Administrator II: This course provides hands-on experience working with more complex and integrated administration concepts, and builds upon the Part I course. Instructs essential local system administration skills including: Logical Volumes, Raid Management, and System Logging, SELinux and Virtual Machines.
RH-295: Linux System Administrator II

S-325: Solaris 10 Features for Experienced Solaris Systems Administrators: Students will be instructed and have labs in how to set up, configure, and administer the new features of the Solaris 10 Update 4 and Nevada Operating System releases including: Solaris Zones, ZFS, Dtrace, Predictive Self-Healing, Solaris Trusted Extensions, and operating system installation.
S-325: Solaris 10 Features for Experienced Solaris Systems Administrators

S-395: Configuring Security on the Solaris 10 OS: Provides enterprise-class features to help protect applications and data. Security Administrators can minimize and harden Oracle Solaris to implement a secure foundation for deploying services.
S-395: Configuring Security on the Solaris 10 OS

S-493: New Features of Solaris 11: This course demonstrates the enhancements to zones and ZFS as well as the new features. During the course, students will examine, through lecture and extensive hands-on work, the Automated Installer (AI), Image Packaging System (IPS) and network virtualization.
S-493: New Features of Solaris 11

S-495: Labeled Security Programming with Trusted Extensions: In this course, students will learn Label APIs to write programs to manage labeled data processes, including Solaris library routines and system calls that use Trusted Extensions parameters.
S-495: Labeled Security Programming with Trusted Extensions

S-595: Solaris Trusted Extensions Installation & Configuration: This course teaches how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers and control privileges and authorizations.  
S-595: Solaris Trusted Extensions Installation & Configuration

N-495: Voice Over IP Foundations: In this course, students will learn how VoIP works, why VoIP works and how to use VoIP.  This course will include configuring an IP Network using Cisco Routers and switches, learning IP fundamentals in order to make VoIP easier to understand.  The last four days of class will focus on VoIP and IP Telephony.
N-495: Voice Over IP Foundations

N-595: VoIP Security Analysis and Design: In this course, the student delves into the dark world of attacking VoIP. Strategies cover attacks at all layers and demonstrate many vectors that work! Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on the leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.
N-595: VoIP Security Analysis and Design

Solaris 11 Is Here!

Oracle will be releasing Solaris 11 in November of 2011.  Even before the release date, Oracle Solaris 11 Express has been available for developers and testers to make the transition easy and smooth.  As instructors getting ready for the change, we have already been working with at Solaris 11 Express, and before that OpenSolaris.

Some of these changes include the cool GUI TimeSlider, similar to Apple Time Machine, utilizing ZFS snapshots; which allows a user to go back in time.  For the administrator this is nothing more than a rollback to a ZFS snapshot.  Other features in ZFS are DEDUP, encryption, and network virtualization, for easier implementation of QOS. 

Transitions are always interesting, especially for instructors.  We have to deal with the issues that involve architecting, implementing, and configuring a new operating system.  We hope we can leverage our previous experience to help ease our students understanding.  It is not just about learning the new commands, options or arguments; it is learning about the "big picture."

Solaris 10 was a good example of this.  It had a variety of new commands to teach, but also a change in the way we approach administration.  For example, Solaris 10 introduced Zones, Service Management Facility (SMF), and Zettabyte File System (ZFS).

Leveraging the previous experience with Solaris 10 is going to be key for a better understanding of Solaris 11.  Enhancements to these same Zones and ZFS requires a strong background in Solaris 10.  Even live upgrade experience to deal with multiple boot environments that involve root on ZFS (now the default behavior) and how we can snapshot, clone and patch the clones are now going to be considered normal procedures.

Two new features in Solaris 11, CrossBow and the Image Packaging System, may not necessarily require Solaris 10 background.  Solaris 10 background just adds a little extra experience.  CrossBow will allow for true virtualization of networks, allowing for easier implementation of quality of service for applications and zones.  If these zones need to network within themselves, we can now efficiently create virtual switches.  Going to a network aware automated update for packages, Solaris 11 promises to make upgrade and patch management much less painful whether you have Zones installed or not. 

In the upcoming months, as Solaris 11 is officially released, look for more blogs to expand on all of these features.  

We look forward to seeing you in our new courses being offered, including our newest Solaris class (S-493: New Features of Solaris 11).

Best Regards,
Bill Peterson
TechNow
(800) 324-2294

Course Overview:

What a great course that is slightly misnamed!  This course may be labeled Security Essentials, but covers much of the subject matter of CISSP!  This course does more than just cover the basics.  TechNow takes the time to give the student hands on labs to exemplify an objective.  Security Essentials Prep Training Course sets the foundation for your security career and sets the expectation of comprehension with more detail than Security+ and more on par with CISSP.

This course provides students skills to take courses that prepare for higher level certifications.

Attendees to TN-929: Security Essentials  Training Course will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 9 days

Course Objectives:

  • 802.11 Suite of Protocols
  • Access Control Theory
  • Alternate Network Mapping Techniques
  • Authentication and Password Management
  • Contingency Planning
  • Crypto Concepts
  • Crypto Fundamentals
  • Defense-in-Depth
  • DNS
  • Firewall Subversion
  • Firewalls
  • HIDS Overview
  • Honeypots
  • ICMP
  • IDS Overview
  • Incident Handling Fundamentals
  • Information Warfare
  • Introduction to OPSEC
  • IP Packets
  • IPS Overview
  • IPv6
  • Legal Aspects of Incident Handling
  • Linux/Unix Configuration Fundamentals
  • Linux/Unix Logging and Log Management
  • Linux/Unix OS Security Tools and Utilities
  • Linux/Unix Overview
  • Linux/Unix Patch Management
  • Linux/Unix Process and Service Management
  • Mitnick-Shimomura
  • Network Addressing
  • Network Design
  • Network Hardware
  • Network Mapping and Scanning
  • Network Plumbing
  • Network Protocol
  • NIDS
  • OverviewPhysical Security
  • Policy Framework
  • Protecting Data at Rest
  • Public Key Infrastructure
  • PKI
  • Reading Packets
  • Risk Management
  • Safety Threats
  • Securing Windows Server Services
  • Steganography
  • OverviewTCPUDP
  • Virtual Machines
  • Virtual Private Networks VPNs
  • Viruses and Malicious Code
  • VoIP
  • Vulnerability Management Overview
  • Vulnerability Scanning
  • Web Application Security
  • Windows Auditing
  • Windows Automation and Configuration
  • Windows Family of Products
  • Windows Network Security Overview
  • Windows Permissions & User Rights
  • Windows Security Templates & Group Policy
  • Windows Service Packs, Hotfixes and Backups
  • Windows Workgroups, Active Directory and Group Policy Overview
  • Wireless Overview

Prerequisites:

 

Comments

Latest comments from students


User: sjsmith2262

Instructor comments: without question, Dave Askey knows his material!!! great instructor that gave a personalized approach.

Facilities comments: class was taught in a hotel reception area, very nice, quiet and convenient for all people


User: synistry

Instructor comments: Dave was great! (as always). Wealth of knowledge and a master at customizing course content to match the education level of his students. The class kept entirely in pace with where we were at as a group overall on a day to day basis.

Facilities comments: Facilities were overall really nice. The only complaint is that the hotel / conference center had us move rooms on one occasion, and kicked us out early on two others. I would assume this is due to the last minute location change, so I don't think there is anything anyone could have done better in the situation.


Liked the class?  Then let everyone know!