Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-215: Cloud+
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • TN-965 Windows Security Automation with Powershell
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • TN-715: Systems Security Certified Practitioner (SSCP)
    • 01/12/2026 – 01/16/2026
    • San Antonio
  • AZ-900: Microsoft Azure Fundamentals
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • in   

    Course Overview:

    Intrusion Analyst is a hands-on course that covers intrusion detection in-depth. This includes concepts such as the use of Snort, network traffic analysis, and IDS signatures.

    A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of packet and intrusion analysis.

    Attendees to TN-979: Intrusion Analyst will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Advanced Snort Concepts
    • Analyst Toolkit
    • Domain Name System (DNS)
    • Examining Packet Crafting
    • Examining Packet Header Fields
    • Fragmentation
    • ICMP Theory
    • IDS Interoperability
    • IDS Patterns
    • IDS/IPS Management & Architecture Issues
    • Indications, Warnings & Traffic Correlation
    • IPv6
    • Microsoft Protocols
    • Network Traffic Analysis
    • NIDS Evasion, Instertion & Checksums
    • Snort Fundamentals & Configuration
    • Snort GUIs & Sensor Management
    • Snort Performance, Active Response & Tagging
    • Snort Rules
    • Stimulus Response
    • TCPdump Fundamentals
    • TCP/IP Fundamentals
    • Wireshark Fundamentals
    • Writing TCPdump Filters

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: Tosha

    Instructor comments: Dave was an excellent instructor. He is very informative and knowledgeable in the course and the material. I have enjoyed the class and I would take another course with him as the instructor.

    Facilities comments: Very nice and clean hotel.


    User: buckey26

    Instructor comments: Dave was one of the best instructors I have ever had for a tech course. He broke down everything to the point where you can understand it internally.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    The introduction to SQL Databases training course is designed to train the learners on the fundamentals of database concepts. You will not only learn about the different types of databases, the languages and designs as well as describe important database concepts using SQL Server 2016. Anyone who is moving into a database role will benefit from taking this course.

     

    Attendees to MS-5002: Introduction to SQL Databases will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 2 days

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.

    Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    03/09/2026 - 03/13/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX
    06/29/2026 - 07/03/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX
    10/05/2026 - 10/09/2026
    08:00 -16:00
    N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
    • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
    • Troubleshoot Layer 2 connectivity using VLANs and trunking
    • Implementation of redundant switched networks using Spanning Tree Protocol
    • Troubleshooting link aggregation using Etherchannel
    • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
    • Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
    • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
    • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
    • Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
    • Describe the virtualization technology of servers, switches, and the various network devices and components
    • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
    • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
    • Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
    • Describe wireless roaming and location services
    • Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
    • Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
    • Troubleshoot wireless client connectivity issues using various available tools
    • Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
    • Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
    • Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
    • Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
    • Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
    • Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
    • Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
    • Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
    • Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
    • Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
    • Explain basic Python components and conditionals with script writing and analysis
    • Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
    • Describe APIs in Cisco DNA Center and vManage

    Prerequisites:

    • CCNA certification
    • Implementation of Enterprise LAN networks
    • Basic understanding of Enterprise routing and wireless connectivity
    • Basic understanding of Python scripting

     

    Comments

    Latest comments from students


    User: don.seguin

    Instructor comments: Tim was a great.

    Facilities comments: The classroom was great.


    User: jrtrussell

    Instructor comments: Awesome

    Facilities comments: Great


    Liked the class?  Then let everyone know!

     

    Course Overview:

    TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

    TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

    This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

    Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Learn to comprehend and develop complex scenarios
    • Identify and create intelligence requirements through practices such as threat modeling
    • Utilize threat modeling to drive intelligence handling and practices 
    • Breakdown tactical, operational, and strategic-level threat intelligence
    • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
    • How to collect adversary information creating better value CTI
    • How to filter and qualify external sources, mitigating low integrity intelligence
    • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
    • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
    • Breaking down threats mapped against their tradecraft to tweak IOCs
    • Establish structured analytical techniques to be successful in any security role
    • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

    Course Prerequisites:

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!