Here are the Information Privacy Protection course offerings:

Course Overview:
Learn how a Modern Desktop Administrators deploys, configures, secures, manage, and monitors devices and client applications in an enterprise environment. This is a hands-on, instructor led Bootcamp focusing on the real world responsibilities of a Modern Desktop Administrator and covering the information needed for the certification exams, which are administered while attending.
If you’ve passed Exam 70-698: Configuring Windows 10 (retired March 31, 2019) you only need to take MD-101 to earn this new certification.
This certification is one of the workload administrator certification required for the Microsoft 365 Certified: Enterprise Administrator Expert certification.
Dates/Locations:
No Events
Duration: 10 Days
Course Content:
-
- Module 01. Installing Windows
- Module 02. Updating Windows
- Module 03. Post-Installation Configuration and Personalization
- Module 04. Configuring Peripherals and Drivers
- Module 05. Configuring Networks
- Module 06. Configuring Storage
- Module 07. Managing Apps in Windows 10
- Module 08. Configuring Authorization & Authentication
- Module 09. Configuring Data Access and Usage
- Module 10. Configuring Advanced Management Tools
- Module 11. Supporting the Windows 10 Environment
- Module 12. Troubleshooting the Windows OS
- Module 13. Troubleshooting Files & Applications
- Module 14. Troubleshooting Hardware and Drivers
- Module 15. Planning an Operating System Deployment Strategy
- Module 16. Implementing Windows 10
- Module 17. Managing Updates for Windows 10
- Module 18. Device Enrollment
- Module 19. Configuring Profiles
- Module 20. Application Management
- Module 21. Managing Authentication in Azure AD
- Module 22. Managing Devices and Device Policies
- Module 23. Managing Security
Prerequisites:
-
-
- Microsoft 365 Certified Fundamentals (M-MS900)
-
Target Audience:
IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow offers the full gamut of programming languages from ANSI C and C++ to the various Microsoft .Net languages (Visual Basic, C# and C++). If you are completely new to programming, TechNow offers courses that demonstrate the fundamentals to get you started.
If you prefer Unix/Linux, we offer Shell Programming, as well as, Perl and Python. We also offer courses in the web development languages, such as, Java Servlets, JSP, and ASP .Net.
The following is a list of our Programming training courses:
- C-215: Introduction to C Programming
- C-225: C++ Object Oriented Programming
- MS-2124: Programming with C#
- P-245: Programming with PERL
- P-315: Intermediate PERL Programming
- P-325: Python Programming
- P-415: Advanced PERL Programming
- PL-115: Fundamentals of Computer Programming
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-345: Python for Penetration Testers
- TN-430: Elasticsearch Engineer (ELK)
- TN-965 Windows Security Automation with Powershell
Course Overview:
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
- Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
- Linux File, Directory, and Permissions Management
- Linux archives using tar and zip
- Interacting with BASH
- Review of Common Linux commands
- Sorting files by line or field
- Regular Expressions (meta character) with grep commands to locate specific lines in files
- Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
- Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
- Miscellaneous commands Tr, sort, cut, past, pr -Lab
- Performing non-interactive editing tasks with the sed command
- Writing simple sed scripts to perform complex editing tasks
- Using awk variables & arrays to sort data
- Employing awk programs to manipulate numeric & textual data
- Performing formatted printing in awk
- Writing simple awk programs to write reports from data files
- Using built-in awk functions & defining new functions
- Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
- Shell Review
- Shell Interpretation of Quotes & Backslash
- The Bash Shell
- Shell's combined with UNIX utilities
- Programming Basics
- Data Constructs
- Programming Looping
- Your Environment
- More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
- System Configuration / Kernel overview
- System Maintenance / Disk and file admin
- Using utilities for process control, locating files & automating maintenance tasks
- System Startup / Boot Process – LILO & GRUB Configuration
- Managing the Linux file system
- Customization of setup files
- Run Levels
- Network Services / Configuration
- User Management Monitoring, accessing & restricting root system access
- Administration Tools
- Process Control
- Client side components of NFS, Samba, NTP, NIS
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
- Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Facilities comments: Facility was fine