Course Overview:

The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it.  The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession.  With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.  CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.  This course will help the student prepare to obtain this credential.

Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • The IS Audit Process (10%)
    • Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
  • IT Governance (15%)
    • Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
  • System and Infrastructure Life Cycle Management (16%)
    • Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
  • IT Service Delivery and Support (14%)
    • Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
  • Protection of Information Assets (31%)
    • Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
  • Business Continuity and Disaster Recovery (14%)
    • Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

Prerequisites:

A minimum of five years of professional information systems auditing, control & security work experienced is required.  Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.

Comments

Latest comments from students


User: fsarisen

Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


User: storoy30

Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


Liked the class?  Then let everyone Know!

 

Course Overview

This course provides students with the knowledge and skills to configure and troubleshoot a Windows Sever 2008 network infrastructure. Students will learn to implement and configure secure network access and implement fault tolerant storage technologies. Students will gain an understanding of the network technologies most commonly used with Windows Server 2008 and IP-enabled networks. Students will also learn how to secure servers and maintain update compliance.  This course maps to Microsoft's 6421 course and is an aid to preparation for exam 70-642.

Attendees to TN-5135: Configuring and Troubleshooting Windows Server 2008 Network Infrastructure will receive TechNow approved course materials and expert instruction.

Dates/Locations

No Events

Duration: 5 Days

Course Objectives

  • Understanding and Configuring IP
  • Configuring Name Resolution
  • Configuring a DNS Zone Infrastructure
  • Configuring a DHCP Infrastructure
  • Configuring IP Routing
  • Protecting Network Traffic with IPsec
  • Connecting to Networks

Prerequisites:

  • Working experience with Windows Server 2003
  • Basic knowledge of Active Directory
  • An understanding of security concepts and methodologies (e.g., corporate policies)
  • Basic knowledge of DHCP
  • Basic knowledge of IPsec

Comments

Latest comments from students


User: brookesr

Instructor comments: Clay was very helpful and very knowledgeable. Microsoft tends to be dry and boring and he didn't not make the class as such.

Facilities comments: Nice - glad they had a bathroom within the class.


User: mamareese

Instructor comments: Instructor was very knowledgable on the subject matter

Facilities comments: Hotel was a good location


 

Liked the class?  Then let everyone know!

 

Course Overview:

This course takes the student from proxy fundamentals through advanced proxy solutions.  This course includes lectures & hands-on labs for a practical experience to install & configure ProxySG appliances, develop granular policies with the Visual Policy Manager (VPM), & utilize logging & the Reporter product. Learn to configure your Blue Coat Proxy appliance for high availability & multi-site deployments, advance policy features, web content control, P2P file sharing control, IM control, steaming media control, application acceleration & reverse proxy deployments, plus Internet/intranet security solutions. The class also reviews hacks on the application level which BlueCoat will prevent.

Attendees to TN-935: BlueCoat Proxy Server Administration will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Protocol & Networking Primer
  • Introduction to ProxySG
  • Deploying ProxySG in a Network
  • Configuring & Managing ProxySG
  • Basic Policy Control Using VPN
  • Authentication of Web Clients
  • Web Content Virus Protection
  • Trouble Shooting Tips
  • Identifying Requirements for Advance Proxy Configuration
  • Using ProxySG to Identify & Create Policy
  • ProxySG Advance Policy Deployment
  • Securing Web Servers with BlueCoat ProxySG (Reverse Proxy)

Prerequisites:

Before attending this class, students are encouraged to familiarize themselves with the following topics:

  • An understanding of your network environment where the BlueCoat Proxy Appliance will be deployed
  • A working knowledge of TCP/IP protocols, DNS, network environments with firewalls, routing, bridging, & switching
  • An understanding of web services using http, https, & ftp
  • A working knowledge of how web servers and web browsers operate

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

  

Course Overview:

This course drills into advanced topics for Server 2012.  Lecture and labs will help the student will learn to incorporate networks and storage into an integrated Server Virtualization strategy.  How to deploy, administer, and monitor a scalable virtualizaiton solution. Updates and High availability solutions protected by PKI will be covered.

The course leads directly to preparing for the MCSE:  Implementing an Advanced Server Infrastructure certification exam 70-414.  It also maps to Microsoft's course 20414B, and is part of the MCSA and MCSE sequence of courses TN-5215 (Microsoft 20410B), TN-5225 (Microsoft 20411B), TN-5235 (Microsoft 20412B), TN-5245 (Microsoft 20413B), TN-5255 (Microsoft 20414B).

Attendees to TN-5255: Implementing an Advanced Server Infrastructure will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Describe the considerations for managing an enterprise data center.
  • Plan and implement a server virtualization strategy using Microsoft System Center 2012.
  • Plan and Implement networks and storage for virtualization.
  • Plan and deploy virtual machines.
  • Manage a virtual machine deployment.
  • Plan and implement a server monitoring strategy.
  • Plan and implement high availability for file services and applications.
  • Plan and implement a high availability infrastructure by using failover clustering.
  • Plan and implement a server-updates infrastructure.
  • Plan and implement a business continuity strategy.
  • Plan and implement a public key infrastructure (PKI).
  • Plan and implement an Identity Federation Infrastructure.
  • Plan and implement an Information Rights Management (IRM) infrastructure.

Prerequisites:

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

Course Overview:

This is an introductory course into the Python scripting language.  This class uses a hands-on approach in teaching the Python language.  This course builds the prerequisite skills for TechNow's P-345: Python for Pentration Testers course.  Getting comfortable with Python is important to understanding how Python can be utilitized for offensive measures.

This course is hands-on with the instructor walking the students through many short examples to exemplify an objective.  Dexterity with the language comes through many small code examples to produce the desired result.  Students have fun acquiring points for all the code examples they get correct.  We must be having fun because TechNow is always amazed at how competitive students are in trying to acquire the most points!  

The instructor will focus on the level that each student is currently at, and ensure the student absorbs the subject matter.  Programming is not a daily tasking of administrators or offensive operators and TechNow understands that.  As an instructor led course TechNow is very successful in making Python accessible to those who do not live eat and breath programming.  If a student's ultimate goal is to attend a course like TechNow's P-345: Python for Pentration Testers course, then not being bogged down in the Python language is critical, and this course (P-325: Python Programming) meets that objective.

Recently we have introduced Raspberry Pi's and multiple sensors to the P-325: Python Programming course.  This enables the student to actually see productive results from their coding skills in the physical world!  Some examples that students create programs for are: Motion detectors, distance, temperature, cameras and keypads.

Attendees to P-325: Python Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • How Python Runs Programs
  • Introducing Python Object Types
    • Numeric Types
    • Dynamic Typing
  • Variables
  • Regular Expressions
  • Strings
  • Conditionals
    • if Tests and Syntax Rules
  • Lists and Dictionaries
  • Tuples and Files
  • Introducing Python Statements
  • Assignments, Expressions, and Prints
  • while and for Loops
  • Iterations and Comprehensions
  • Documentation
  • Function Basics
  • Built-In Functions
  • Scopes
  • Arguments
  • Modules
  • Module Packages and Importing
  • Classes and OOP
  • Operator Overloading
  • Recursion
  • Exception Coding Details
  • Exception Objects
  • Unicode and Byte Strings
  • Working with Raspberry Pi
    • Writing code for sensors

Prerequisites:

  • Experience with some form of programming is preferred

 

Comments

Latest comments from students


User: slewis8435

Instructor comments: Very good instructor - he was excited about the material, very knowledgeable, and explained things clearly.

Facilities comments: The facilities were fine - plenty of room for each student to set up an extra computer and have room for note taking


User: nathan.karras

Instructor comments: Instructor was extremely knowledgeable in programming and scripting. He encouraged students to explore and ask questions. He would work with individuals to troubleshoot lab problems sets. Would highly recommend as an instructor.

Facilities comments: Room got a little warn. Instructor purchased fans to cool things off for the class. Projector had over scan.


Liked the class?  Then let everyone know!