Here are the General Unix course offerings:
TechNow offers the full gamut of programming languages from ANSI C and C++ to the various Microsoft .Net languages (Visual Basic, C# and C++). If you are completely new to programming, TechNow offers courses that demonstrate the fundamentals to get you started.
If you prefer Unix/Linux, we offer Shell Programming, as well as, Perl and Python. We also offer courses in the web development languages, such as, Java Servlets, JSP, and ASP .Net.
The following is a list of our Programming training courses:
- C-215: Introduction to C Programming
- C-225: C++ Object Oriented Programming
- MS-2124: Programming with C#
- P-245: Programming with PERL
- P-315: Intermediate PERL Programming
- P-325: Python Programming
- P-415: Advanced PERL Programming
- PL-115: Fundamentals of Computer Programming
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-345: Python for Penetration Testers
- TN-430: Elasticsearch Engineer (ELK)
- TN-965 Windows Security Automation with Powershell
Course Overview:
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
04/13/2026 - 04/17/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
|
04/27/2026 - 05/01/2026 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
|
07/27/2026 - 07/31/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
|
12/07/2026 - 12/11/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Information Systems Auditing Process (18%)
- Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
- Governance & Management of IT (18%)
- This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
- Information Systems Acquisition, Development & Implementation (12%)
- Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
- Information Systems Operation & Business Resilience (26%)
- Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.s.
- Protection of Information Assets (26%)
- Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone Know!
Course Overview:
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).
Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/16/2026 - 03/20/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
|
07/06/2026 - 07/10/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
- Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
- Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
- Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
- Optimize OSPFv2 and OSPFv3 behavior
- Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
- Implement route redistribution using filtering mechanisms
- Troubleshoot redistribution
- Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
- Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
- Optimize MP-BGP in IPv4 and IPv6 environments
- Troubleshoot MP-BGP for IPv4 and IPv6
- Describe the features of Multiprotocol Label Switching (MPLS)
- Describe the major architectural components of an MPLS VPN
- Identify the routing and packet forwarding functionalities for MPLS VPNs
- Explain how packets are forwarded in an MPLS VPN environment
- Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
- Implement Dynamic Host Configuration Protocol (DHCP)
- Describe the tools available to secure the IPV6 first hop
- Troubleshoot Cisco router security features
- Troubleshoot infrastructure security and services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of network fundamentals
- Basic knowledge of how to implement LANs
- General understanding of how to manage network devices
- General understanding of how to secure network devices
- Basic knowledge of network automation
Comments
Latest comments from students
Liked the class? Then let everyone know!
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
- Getting started running commands
- Security cmdlets
- Using and updating the built-in help
- Execution policies
- Fun tricks with the ISE graphical editor
- Piping .NET and COM objects, not text
- Using properties and methods of objects
- Helping Linux admins feel more at home
- Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
- Customizing your profile script
- PowerShell remote command execution
- Security setting across the network
- File copy via PowerShell remoting
- Capturing the output of commands
- Parsing text files and logs with regex patterns
- Parsing Security Logs
- Searching remote event logs
- Mounting the registry as a drive
- Security settings in the Registry
- Exporting data to CSV, HTML and JSON files
- Running scripts as scheduled jobs
- Continued Security Compliance
- Pushing out scripts through Group Policy
- Importing modules and dot-sourcing functions
- http://www.PowerShellGallery.com
PowerShell Scripting
- PowerShell Scripting to implement Security Practices
- Writing your own functions to automate security status and settings
- Passing arguments into your scripts
- Function parameters and returning output
- Flow control: if-then, foreach, that make security decisions
- How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]