Course Overview:

In this course students will learn to configure the Linux kernel, install & configure modules, to install and configure non-default devices and automate installation with Kickstart. Students also utilize skills developed in L-245 to expand on file system configuration with spanning devices and RAID. This is the foremost server side Linux course in the industry covering all server side components such as DHCP, Samba, NIS, LDAP, inet, telnet ftp, dns, etc.  Expanding on security introduced in L-245: Linux System Administration I, TCP wrappers, firewalling with IP filters, SQUID, & ssh are covered.

Attendees to L-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Custom installation of a Linux server
  • Linux device naming conventions & the boot process
  • Adding peripheral devices
  • Reconfiguring the kernel
  • Disk partitioning & formatting
  • Changing system run levels
  • Adding startup files for additional services
  • Adding & removing software packages
  • Disk & file system Administration
  • Terminals & modem configuration
  • Configuring NFS to support the client/server environment
  • Use the automounter
  • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
  • Troubleshooting techniques
  • Advanced Linux installation

Prerequisites:

 

Comments

Latest comments from students



Liked the class?  Then let everyone know!

Course Overview:

This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products.  Through a combination of hands-on labs and lecture the student will become more confident in configuring and using the Juniper product.

Attendees to TN-612: Advanced Juniper Networks IPsec VPN Implementations will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives:

  • Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations.
  • Configure VPN redundancy.
  • Configure dynamic routing using IPsec VPNs.
  • Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE.
  • Configure generic routing encapsulation (GRE) tunnels.

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

J-215: Advanced Java Programming explores advanced Java language features & packages. Java programmers will be able to take the content learned and immediately apply it to the problems encountered on the job.

Attendees to J-215: Advanced Java Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Object Serialization
  • Reflection
  • Advanced JDBC
  • Networking with Sockets
  • Remote Method Invocation
  • Advanced RMI
  • Managing Security Policies
  • Keys, Signatures & Certificates
  • Encryption with javax.crypto Package
  • Java Authentication and Authorization Service (JAAS)
  • Java Naming & Directory Interface (JNDI)
  • Parsing XML with Java – JAXP
  • Native Methods
  • Java Design Patterns – Creational Patterns
  • Java Design Patterns – Structural Patterns
  • Java Design Patterns – Behavioral Patterns

Prerequisites:

 

Comments

Latest comments from students


User: dhonore

Instructor comments: Dave's presentation style is engaging and lively.

Facilities comments: The room was adequate for the needs of the class.


User: phouck

Instructor comments: David was very good. Although he went very fast at times.

Facilities comments: The room was ok. it was bit dark.


 

Liked the class?  Then let everyone know!

There is a great New York Times Article that details current events regarding intellectual property theft with China.  This problem is as old as dirt, but we are all aware what the impact of IT has had on the velocity of intellectual property theft.  Additionally, when there are structured and pseudo government support for these aggressive and damaging activities the volume and impact is difficult to comprehend.  

TechNow has had a very aggressive training program with respect to this type of problem for over twenty years.  Even with an array of SANS certifications, ISC2, CompTIA, and other certifications we are still challenged to as an industry to keep upper level management informed and motivated to take action.  The policies and mitigations to minimize a foriegn government, organized, well funded attack against intellectual property is cost prohibitive.

Our government needs to become agressive in this area as the impact on our national security is dramatic.  These aggessive strategies will likely utilize individuals who have acquired high end skills with our training programs in reverse engineering, intrusion analysis, systems penetration, and malware engineering, applied both in the corporate sector and Intelligence Community.