You must be logged in to use this form
Course Overview:
TN-205: A+ Skills Class provides students with the skills, knowledge and understanding that will enable them to install, configure, upgrade, troubleshoot and repair personal computer systems. The A+ curriculum is excellent preparation for almost any computer related career or position. This course lays the foundation for further study in networking and programming. Designed for the new computer professional who has support knowledge of PC hardware, but needs to expand upon that knowledge.
Attendees to the TN-205: A+ Skills Class will receive TechNow approved course materials and expert instruction.
Please Note: This course is designed with a focus on skills and is not a preparation course for certification.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Identifying, Adding & Removing System Components
- Installation, Configuring & System Optimization
- Diagnosing & Troubleshooting Problems
- Power Protection & Safety Procedures
- Motherboards, Processors & Memory
- Printers
- Basic Networking
- Operating System Fundamentals
- Installation, Configuration & Upgrade
- Diagnosing & Troubleshooting
- Networks
Prerequisites:
-
None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.
Liked the class? Then let everyone know!
Course Overview:
PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.
Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Packages and namespaces
- References and scoping
- Manipulating complex data structures
- Object-oriented programming
- Writing and using modules
- Testing PERL code
- Contributing to CPAN
Prerequisites:
- P-245: Programming with PERL or equivalent knowledge and skills
Comments
Latest comments from students
User: J Masters
Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.
Liked the class? Then let everyone know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
