- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
Course Overview:
The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.
This course is designed to assist in your exam preparation for the CISM exam.
Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/23/2026 - 02/27/2026 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
|
08/17/2026 - 08/21/2026 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
|
11/16/2026 - 11/20/2026 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Information Security Governance (24%)
- Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
- Information Risk Management (30%)
- Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
- Information Security Program Development and Management (27%)
- Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
- Information Security Incident Management (19%)
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Prerequisites:
A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.
Comments
Latest comments from students
User: tracycampbell
Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.
Facilities comments: The Home2Suites by Hilton was FANTASTIC!
Liked the class? Then let everyone know!
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
Course Overview:
This FastTrack course combines combines two VMware courses (VMware Cloud Essentials and vCloud Architecting the VMware Cloud) into a single week course that adds extra exercises and labs to exemplify the techniques presented. The course begins with how to adopt, operate, and govern the cloud. The course enables participants to successfully complete the associated CompTIA Cloud Essentials™ Exam to become a Cloud Essentials™ Professional(CEP). This course also covers the subject matter specified by the VCP-Cloud certification.
This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud environment. Detailed labs and exercises for VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. A comprehensive VMware cloud design is demonstrated and discussed.
Attendees to VM-335: VMware Cloud Essentials and vCloud – Architecting the VMware Cloud FastTrack will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Understand the common terms and definitions of cloud computing.
- Understand the business benefits and business considerations of cloud computing.
- Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
- Understand the impact and changes of cloud computing on IT service management.
- Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
- Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
- Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
- Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
- Design a network infrastructure optimized for vCloud.
- Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security rolesnderstand the common terms and definitions of cloud computing.
- Understand the business benefits and business considerations of cloud computing.
- Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
- Understand the impact and changes of cloud computing on IT service management.
- Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
- Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
- Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
- Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources.
- Design a network infrastructure optimized for vCloud.
- Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles.
- Design a vCenter Chargeback implementation.
Course Prerequisites:
- VM-315 or equivalent experience.
- Managing or administering at least one of UNIX, Windows, databases, networking, or security.
Comments
Latest comments from students
Liked the class? Then let everyone know!