Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 05/18/2026 – 05/22/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-913: Cloud Security Fundamentals
    • 05/27/2026 – 05/29/2026
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • in   

    Course Overview:

    As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications.  In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP.   Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.  Other protocols such as Nortel's UNIStim will be addressed.  As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures.   Various open source tools including those in BackTrack are used for VoIP attacks.  A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.

    Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • VoIP Architecture
    • VoIP Signaling and media protocols
    • Common VoIP authentication mechanisms
    • Common VoIP encryption techniques
    • VoIP protocol analysis with Wireshark
    • Maintaining QoS while mitigating DoS
    • VoXML, XML, and application integration security
    • Converged network security design and implementation
    • Impact of NAT and firewalls
    • SIP, H.323, and MGCP vulnerabilities
    • VPN, IPsec and SRTP to secure VoIP services
    • Penetration testing with open source tools
    • Attacks for Eavesdropping, call redirection, and DoS
    • Design of hacked firmware virtualization layer
    • Concise lockdown steps for network hardware and VoIP

    Prerequisites:

    • This is an advanced Information Security Course which requires basic Windows & UNIX competency
    • Certification or 2 years of experience in these operating systems is highly recommended
    • As well as an understanding of TCP/IP

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.

    Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • The Current State of the Telecom Industry
    • Telecom Service Providers
    • Digitalizing Voice
    • Communication Mediums and Multiplexing
    • Carrier Access: Customer-to-Carrier Connections
    • Broadband Access
    • Enterprise Networks
    • Carrier Transport Services
    • Data Communications and Packet-Switched Networks
    • Migrating Voice from Circuit-to-Packet-Switched Networks
    • Carrier Data Services
    • Ethernet Services
    • Remote Access Virtual Private Networks (VPNs)
    • Video Technology and Services
    • Current Mobile Wireless Services
    • Fixed Mobile Convergence (FMC)
    • Worldwide Interoperability for Microwave Access (WiMax)
    • Multimedia Subsystem (IMS)

    Prerequisites:

    • None

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

      

     

    Course Overview:  PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats.  Successful completion of this course enables administrators to better understand the threat landscape.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

    The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats  (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 2 days

    Course Objectives:   Students attending this training course will gain an understanding of cyberthreats and their characteristics.  Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.

    Day 1

    • Mod 1: Threat Landscape
      • Advanced Persistent
      • Threats
      • Data Breaches and Tactics
      • Threat Management
      • Strategies
    • Mod 2: Integrated
      • Approach to Threat
      • Protection
      • Integrated Approach to
      • Protection
      • Next-Generation Firewall
      • Advanced Endpoint
      • Protection
    • Mod 3: Network Visibility
      • Zero Trust Model
      • SSL Decryption
      • Decryption Policy
    • Mod 4: Reducing the Attack
      • Surf
      • ection

     

    Day 2

    • Mod 5: Handling Known
      • Threats
      • WildFire Analysis
      • Security Profiles
    • Mod 6: Handling Unknown
      • Traffic and Zero-Day Exploits
      • WildFire
      • Researching Threat Events
      • Identifying Unknown
      • Applications
    • Mod 7: Investigating
      • Breaches
      • Identify IOCs Using
      • App-Scope
      • Log Correlation
      • Finding Infected Host
    • Mod 8: Using Custom
      • Signatures
      • Creating Custom App-IDs
      • Threat Signatures

    A

    Prerequisites:

    • Students must complete the PA-213: Install, Configure, and Manage course
    • Understanding of network concepts, including routing, switching, and IP addressing
    • In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!

     

    Course Overview:

    Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

    What’s Included:

    • Authorized courseware
    • Exam voucher
    • IAPP membership

    **GDPR Regulation Mandated May 25, 2018**

    Course Objectives:

    Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
    The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.

    Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

    TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

    TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 2 Days

    Course Content:

    • Module 1: Data Protection Laws
    • Module 2: Personal Data
    • Module 3: Controllers and Processors
    • Module 4: Processing Personal Data
    • Module 5: Information Provision
    • Module 6: Data Subjects’ Rights
    • Module 7: Security of Processing
    • Module 8: Accountability
    • Module 9: International Data Transfers
    • Module 10: Supervisions and Enforcement
    • Module 11: Compliance.

     

    Prerequisites: None

    Target Audience:

    Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!