As an organization we understand how important it is to keep up with technology, as well as bringing everyone up to speed with the fundamentals. In the IT realm we offer in-classroom courses beginning with basic concepts all the way through real-time live debugging without source code.All Services
This course focuses on the triage of Windows systems and teaches the skills needed to understand at a high level what is wrong with a system and how to develop a details approach to troubleshooting. Instead of just rebooting a system because it is slow, we show how to find the data that explains what is slowing the system down (lack of resources or specific application). We show "how" software executes and what the architecture of an application really looks like. If you do not know how software executes or how the operating system works to execute the software, then you cannot effectively troubleshoot it when it breaks.
In this course we dig deep into operating system fundamentals such as thread execution, call stacks, process heaps, and windows, messaging. We build a set of fundamentals on operating systems, networks, databases, and take a deep dive into COM and RPC which are building blocks for most commercial software.
We install and configure Oracle and Microsoft SQL Server. The architecture of an RDBMS and the language syntax (SQL, DML, DCL, DDL)
as well as resource looking and debugging are all covered.
The traditional support engineer rarely looks at network data during their troubleshooting. This is predominantly due to a lack of knowledge of how application troubleshooting can take advantage of the data on the network. Our course focuses on decoding the data obtained from the newwork analyzers Wireshark and Microsoft Netmon. When a client/browser application queries data from an application server/database/web, the data traverses the network. The network analyzer presents the data in the form of protocol packets that wew show how to read and reassemble into html pages, SQL queries, and data files. We show how to examine connections, traffic flow, and decode encrypted data.
In the Diagnostic Tools class, we explore a product called Windbg. Thos tool is used to examine the actual memory of a system or process and explore the
call stack and heap of an application. We examine running process memory and look at memory dumps (Dr. Watson's, blue screens).
In this course, we big deep into the disassembly of code and teach how to read the disassembly (without source code). It is an ethical reverse engineering course. We teach how to debug a 100% CPU failure in 5 loops, for loops, and if-then-else code. We debug thread synchronization mechanisms such as mutexes, critical sections, and semaphores.
Kernel debugging and User debugging are examines as well as 32-bit and 64-bit code.