Course Overview:

TechNow’s Course ensures that you are ready to test for the CCNA Certification. This intensive ten-day program is a high end, hands-on, bootcamp using physical routers & switches in classroom.  Students will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. Additionally the course stress tests the students on exam practices that insure the student a successful outcome on the 200-301 CCNA exam.

This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability.

Attendees to N-310: CCNA Extended Bootcamp will receive TechNow approved course materials and expert instruction.

Date/Locations:

This course is available for group purchasing with a minimum of 4 students. Please call to get scheduling availability. (210) 733-1093

No Events

Duration: 10 days

Course Objectives:

    • Identify the components of a computer network and describe their basic characteristics
    • Understand the model of host-to-host communication
    • Describe the features and functions of the Cisco Internetwork Operating Systems (IOS) software
    • Describe LANs and the role of switches within LANs
    • Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
    • Install a switch and perform the initial configuration
    • Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
    • Describe the TCP/IP Transport layer and Application layer
    • Explore functions of routing
    • Implement basic configuration on a Cisco router
    • Explain host-to-host communications across switches and routers
    • Identify and resolve common switched network issues and common problems associated with IPv4 addressing
    • Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
    • Describe the operation, benefits, and limitations of static routing
    • Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
    • Describe the application and configuration of inter-VLAN routing
    • Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
    • Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
    • Configure link aggregation using EtherChannel
    • Describe the purpose of Layer 3 redundancy protocols
    • Describe basic WAN and VPN concepts
    • Describe the operation of Access Control Lists (ACLs) and their applications in the network
    • Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
    • Describe basic Quality of Service (QoS) concept
    • Describe network and device architectures and introduce virtualization
    • Introduce the concept of network programmability and Software-Defined Networking (SDN)
    • Configure basic IOS system monitoring tools
    • Describe the management of Cisco devices
    • Describe the current security threat landscape
    • Describe threat defense technologies
    • Implement a basic security configuration of the device management plane
    • Implement basic steps to harden network devices

Lab Objectives:

      • Get started with Cisco Command-Line Interface (CLI)
      • Observe How a Switch Operates
      • Perform Basic Switch Configuration
      • Implement the Initial Switch Configuration
      • Inspect TCP/IP Applications
      • Configure an Interface on a Cisco Router
      • Configure and Verify Layer 2 Discovery Protocols
      • Implement an Initial Router Configuration
      • Configure Default Gateway
      • Explore Packet Forwarding
      • Troubleshoot switch Media and Port Issues
      • Troubleshoot Port Duplex Issues
      • Configure Basic IPv6 Connectivity
      • Configure and Verify IPv4 Static Routes
      • Configure Iv6 Static Routes
      • Implement IPv4 Static Routing
      • Implement IPv6 Static Routing
      • Configure VLAN and Trunk
      • Troubleshoot VLANs and Trunk
      • Configure a Router on a Stick
      • Implement Multiple VLANs and Basic Routing Between the VLANs
      • Configure and Verify Single-Area OSPF
      • Configure and Verify EtherChannel
      • Improve Redundant Switched Topologies with EtherChannel
      • Configure and Verify IPv4 ACLs
      • Implement Numbered and Named IPv4 ACLs
      • Configure a Provider-Assigned IPv4 Address
      • Configure Static NAT
      • Configure Dynamic NAT and Port Address Translation (PAT)
      • Implement PAT
      • Log into the WLC
      • Monitor the WLC
      • Configure a Dynamic (VLAN) Interface
      • Configure a DHCP Scope
      • Configure a WLAN
      • Define a Remote Access Dial-In User Service (RADIUS) Server
      • Explore Management Options
      • Explore the Cisco DNA Center
      • Configure and Verify NTP
      • Configure System Message Logging
      • Create the Cisco IOS Image Backup
      • Upgrade Cisco IOS Image
      • Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
      • Secure Console and Remote Access
      • Enable and Limit Remote Access Connectivity
      • Secure Device Administrative Access
      • Configure and Verify Port Security
      • Implement Device Hardening

Prerequisites:

      • Familiarity in the following networking topics:
        • TCP/IP
        • IP Configuration
        • Peer-to-Peer Networking
        • Subnetting
        • Building a Routing Table
      • It is not required but highly recommended to have the following certifications:

Comments

Latest comments from students


User: kdinivahi29

Instructor comments: The instructor Mr. Tom Bigger has done a terrific job of substantiating the textbook content with hands on labs. He has been patient and ensure that we understood the material


User: MikeWisn

Instructor comments: Did exceptional job explaining complicated concepts.

Facilities comments: Hotel front desk phone ringing loudly during class was distracting.


Liked the class?  Then let everyone know!

Happy Veterans Day!

TechNow would like to honor and remember all those who have served and sacrificed for our country.  We would also like to give a big Thank You to all the men and women who are still serving and fighting for our Country today!

New Courses Offered!

We are now offering a variety of new specialized courses!  The following of which are featured:

RH-245: Linux System Administrator I: This course gives direct experience with the most essential system administration tasks in RedHat. The course also instructs crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local devices, installation, package management, performing system boot procedures, grub and controlling system processes.
RH-245: Linux System Administrator I

RH-295: Linux System Administrator II: This course provides hands-on experience working with more complex and integrated administration concepts, and builds upon the Part I course. Instructs essential local system administration skills including: Logical Volumes, Raid Management, and System Logging, SELinux and Virtual Machines.
RH-295: Linux System Administrator II

S-325: Solaris 10 Features for Experienced Solaris Systems Administrators: Students will be instructed and have labs in how to set up, configure, and administer the new features of the Solaris 10 Update 4 and Nevada Operating System releases including: Solaris Zones, ZFS, Dtrace, Predictive Self-Healing, Solaris Trusted Extensions, and operating system installation.
S-325: Solaris 10 Features for Experienced Solaris Systems Administrators

S-395: Configuring Security on the Solaris 10 OS: Provides enterprise-class features to help protect applications and data. Security Administrators can minimize and harden Oracle Solaris to implement a secure foundation for deploying services.
S-395: Configuring Security on the Solaris 10 OS

S-493: New Features of Solaris 11: This course demonstrates the enhancements to zones and ZFS as well as the new features. During the course, students will examine, through lecture and extensive hands-on work, the Automated Installer (AI), Image Packaging System (IPS) and network virtualization.
S-493: New Features of Solaris 11

S-495: Labeled Security Programming with Trusted Extensions: In this course, students will learn Label APIs to write programs to manage labeled data processes, including Solaris library routines and system calls that use Trusted Extensions parameters.
S-495: Labeled Security Programming with Trusted Extensions

S-595: Solaris Trusted Extensions Installation & Configuration: This course teaches how to design and configure Trusted Extensions security label mechanisms, use extended security features of the two graphical desktops, compartmentalize system administrator powers and control privileges and authorizations.  
S-595: Solaris Trusted Extensions Installation & Configuration

N-495: Voice Over IP Foundations: In this course, students will learn how VoIP works, why VoIP works and how to use VoIP.  This course will include configuring an IP Network using Cisco Routers and switches, learning IP fundamentals in order to make VoIP easier to understand.  The last four days of class will focus on VoIP and IP Telephony.
N-495: Voice Over IP Foundations

N-595: VoIP Security Analysis and Design: In this course, the student delves into the dark world of attacking VoIP. Strategies cover attacks at all layers and demonstrate many vectors that work! Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on the leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.
N-595: VoIP Security Analysis and Design

Solaris 11 Is Here!

Oracle will be releasing Solaris 11 in November of 2011.  Even before the release date, Oracle Solaris 11 Express has been available for developers and testers to make the transition easy and smooth.  As instructors getting ready for the change, we have already been working with at Solaris 11 Express, and before that OpenSolaris.

Some of these changes include the cool GUI TimeSlider, similar to Apple Time Machine, utilizing ZFS snapshots; which allows a user to go back in time.  For the administrator this is nothing more than a rollback to a ZFS snapshot.  Other features in ZFS are DEDUP, encryption, and network virtualization, for easier implementation of QOS. 

Transitions are always interesting, especially for instructors.  We have to deal with the issues that involve architecting, implementing, and configuring a new operating system.  We hope we can leverage our previous experience to help ease our students understanding.  It is not just about learning the new commands, options or arguments; it is learning about the "big picture."

Solaris 10 was a good example of this.  It had a variety of new commands to teach, but also a change in the way we approach administration.  For example, Solaris 10 introduced Zones, Service Management Facility (SMF), and Zettabyte File System (ZFS).

Leveraging the previous experience with Solaris 10 is going to be key for a better understanding of Solaris 11.  Enhancements to these same Zones and ZFS requires a strong background in Solaris 10.  Even live upgrade experience to deal with multiple boot environments that involve root on ZFS (now the default behavior) and how we can snapshot, clone and patch the clones are now going to be considered normal procedures.

Two new features in Solaris 11, CrossBow and the Image Packaging System, may not necessarily require Solaris 10 background.  Solaris 10 background just adds a little extra experience.  CrossBow will allow for true virtualization of networks, allowing for easier implementation of quality of service for applications and zones.  If these zones need to network within themselves, we can now efficiently create virtual switches.  Going to a network aware automated update for packages, Solaris 11 promises to make upgrade and patch management much less painful whether you have Zones installed or not. 

In the upcoming months, as Solaris 11 is officially released, look for more blogs to expand on all of these features.  

We look forward to seeing you in our new courses being offered, including our newest Solaris class (S-493: New Features of Solaris 11).

Best Regards,
Bill Peterson
TechNow
(800) 324-2294

After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

Scroll down to see the course description.

First Name*
Last Name*
Your Email*
Your Organization*
Phone*

Questions:

After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

Windows Security Automation and Threat Hunting with PowerShell Seminar

Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

Date: October 10, 2018 8:00am – 4:00pm

Duration: 8 hours

Audience: Cyber Security professionals and Windows administrators

Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

Objectives:

PowerShell Overview

  • Getting started running commands
  • Security cmdlets
  • Using and updating the built-in help
  • Execution policies
  • Fun tricks with the ISE graphical editor
  • Piping .NET and COM objects, not text
  • Using properties and methods of objects
  • Helping Linux admins feel more at home
  • Aliases, cmdlets, functions, modules, etc.

PowerShell Utilities and Tips

  • Customizing your profile script
  • PowerShell remote command execution
  • Security setting across the network
  • File copy via PowerShell remoting
  • Capturing the output of commands
  • Parsing text files and logs with regex patterns
  • Parsing Security Logs
  • Searching remote event logs
  • Mounting the registry as a drive
  • Security settings in the Registry
  • Exporting data to CSV, HTML and JSON files
  • Running scripts as scheduled jobs
  • Continued Security Compliance
  • Pushing out scripts through Group Policy
  • Importing modules and dot-sourcing functions
  • http://www.PowerShellGallery.com

PowerShell Scripting

  • PowerShell Scripting to implement Security Practices
  • Writing your own functions to automate security status and settings
  • Passing arguments into your scripts
  • Function parameters and returning output
  • Flow control: if-then, foreach, that make security decisions
  • How to pipe data in/out of your scripts for security compliance and reporting

Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

Scroll down to see the course description.

First Name*
Last Name*
Your Email*
Your Organization*
Phone*

Questions:

After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

Windows Security Automation and Threat Hunting with PowerShell Seminar

Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

Date: October 10, 2018 8:00am – 4:00pm

Duration: 8 hours

Audience: Cyber Security professionals and Windows administrators

Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

Objectives:

PowerShell Overview

  • Getting started running commands
  • Security cmdlets
  • Using and updating the built-in help
  • Execution policies
  • Fun tricks with the ISE graphical editor
  • Piping .NET and COM objects, not text
  • Using properties and methods of objects
  • Helping Linux admins feel more at home
  • Aliases, cmdlets, functions, modules, etc.

PowerShell Utilities and Tips

  • Customizing your profile script
  • PowerShell remote command execution
  • Security setting across the network
  • File copy via PowerShell remoting
  • Capturing the output of commands
  • Parsing text files and logs with regex patterns
  • Parsing Security Logs
  • Searching remote event logs
  • Mounting the registry as a drive
  • Security settings in the Registry
  • Exporting data to CSV, HTML and JSON files
  • Running scripts as scheduled jobs
  • Continued Security Compliance
  • Pushing out scripts through Group Policy
  • Importing modules and dot-sourcing functions
  • http://www.PowerShellGallery.com

PowerShell Scripting

  • PowerShell Scripting to implement Security Practices
  • Writing your own functions to automate security status and settings
  • Passing arguments into your scripts
  • Function parameters and returning output
  • Flow control: if-then, foreach, that make security decisions
  • How to pipe data in/out of your scripts for security compliance and reporting

Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.

in   
 

Course Overview:

TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment.  Security teams wrestle with the impact and liability of Cloud computing on an organization.  This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).

Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment.  Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy.  Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds.   Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.

Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
05/29/2024 - 05/31/2024
08:30 -16:30
TN-913: Cloud Security Fundamentals
TechNow, Inc, San Antonio TX
08/26/2024 - 08/28/2024
08:30 -17:00
TN-913: Cloud Security Fundamentals
TechNow, Inc, San Antonio TX
11/12/2024 - 11/14/2024
08:30 -16:30
TN-913: Cloud Security Fundamentals
TechNow, Inc, San Antonio TX

Course Duration: 3 days

Course Objectives:

  • Cloud computing introduction
  • Security challenges in the cloud
  • Infrastructure security in the cloud
  • Policy, risk, and governance for cloud computing
  • Compliance and legal considerations
  • Audit and assessment for the cloud
  • Data security in the cloud
  • Identity and Access Management (IAM)
  • Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
  • Intrusion detection and incident response

Course Prerequisites:

  • GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures
  • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

Comments

Latest comments from students


User: reedrobt

Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?

Facilities comments: Home2 location was well-kept and convenient to other services.


 

Liked the class?  Then let everyone know!