TN-205: A+ Skills Class provides students with the skills, knowledge and understanding that will enable them to install, configure, upgrade, troubleshoot and repair personal computer systems. The A+ curriculum is excellent preparation for almost any computer related career or position. This course lays the foundation for further study in networking and programming. Designed for the new computer professional who has support knowledge of PC hardware, but needs to expand upon that knowledge.
Attendees to the TN-205: A+ Skills Class will receive TechNow approved course materials and expert instruction.
Please Note: This course is designed with a focus on skills and is not a preparation course for certification.
This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM. Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.
Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.
At the end of this course, you should understand the features and operations of View and be able to:
Install and configure View components
Create and manage dedicated and floating desktop pools
Deploy and manage linked-clone virtual desktops
Configure and manage desktops that run in local mode
Configure secure access to desktops through a public network
Use ThinApp to package applications
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Module 1: Course Introduction
Module 2: Introduction to VMware View
Module 3: View Connection Server
Module 4: View Desktops
Module 5: View Client Options
Module 6: View Administratory
Module 7: Configuring and Managing Linked Clones
Module 8: Local-Mode Desktops
Module 9: Command-Line Tools and Backup Options
Module 10: Managing VMware View Security
Module 11: View Manager Performance and Scalability
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
EC-Council official E-Courseware
EC-Council official Certificate of Attendance
EC-Council iLabs with access for 6 months
EC-Council CPENT Range access
CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
Module 01. Introduction to Penetration Testing
Module 02. Penetration Testing Scoping and Engagement
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.
What’s Included:
5 days of instructor led in classroom training
Labs
PenTest+ Courseware
Exam Voucher
PenTest+ onsite exam scheduling
Course Objectives:
Plan and scope penetration tests
Conduct passive reconnaissance
Perform non-technical tests to gather information
Conduct active reconnaissance
Analyze vulnerabilities
Penetrate networks
Exploit host-based vulnerabilities
Test application
Complete post-exploit tasks
Analyze and report pen test results
Dates/Locations:
No Events
Duration: 5 Days
Course Content:
Module 01. Planning and Scoping Penetration Tests
Module 02. Conducting Passive Reconnaissance
Module 03. Performing Non-Technical Tests
Module 04. Conducting Active Reconnaissance
Module 05. Analyzing Vulnerabilities
Module 06. Penetrating Networks
Module 07. Exploiting Host-Based Vulnerabilities
Module 08. Testing Applications
Module 09. Completing Post-Exploit Tasks
Module 10. Analyzing and Reporting Pen Test Results
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.