Increase your credibility, job security, and career opportunities by reaching your goal and getting certified!  TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class.  We have a proven testing program that will get you the results you want!

in   
 

Course Overview:

 

This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations.  We have a suite of courses and certifications that help  understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.

The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.

This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python.  The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.

This course utilizes the “Violent Python” text book.

Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 3 Days

Course Objectives:

  • Python Lanuage Refress
  • Network Sockets
  • Exception Handling
  • Hashes and Cracking Passwords
  • Threading
    • Concepts and Python Implementation
    • Queues and Synchronization
    • urlparse and httplib to probe URLs
    • Crack a password protected zip file
  • Port Scanner
    • Threading a Port Scanner
  • nmap integration
  • Deploying shellcode
  • Mechanize, BeautifulSoup
    • HTTP Form Password Guessing
    • HTTP Proxies (Burp Suite)
    • HTTP Cookies Session Hijacking
      • CookieMonster
  • Images and Metadata
  • Justniffer
  • SQL Injection
    • sqlmap
    • SQLBrute
  • Antivirus and IDS evasion
    • PyInstaller
    • Metasploit
  • Scapy
    • Deploy shellcode
    • DNS Cache Poisoning
    • Packety Violence

Prerequisites:

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • CT-325: Security+
    • 08/18/2025 – 08/22/2025
    • San Antonio
  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • in   

    Course Overview:

    The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

    This course is designed to assist in your exam preparation for the CISM exam.

    Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    11/17/2025 - 11/21/2025
    08:00 -16:00
    TN-825: Certified Information Security Manager (CISM) Seminar
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Information Security Governance (24%)
    • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
    • Information Risk Management (30%)
    • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
    • Information Security Program Development and Management (27%)
    • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
    • Information Security Incident Management (19%)
    • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

    Prerequisites:

    A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

    Comments

    Latest comments from students


    User: tracycampbell

    Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

    Facilities comments: The Home2Suites by Hilton was FANTASTIC!



    Liked the class?  Then let everyone know!

     

    Course Overview:

    This bootcamp is a customized course for Cloud Essentials+ and Cloud+ that leverages 8 days to provide greater value than just the delivery of two separate courses. The 8 days of instruction prepare the student for the CCSP course.

    TechNow has Identified overlap and uses time saved to:

    • Introduce hands-on skills (Open Source and AWS)
    • Go more in-depth on theory using hands-on to reinforce concepts
    • Do exam prep with practice questions

    This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.

    This bootcamp helps prepare students for 2 certifications, CompTIA Clouds Essentials+ and CompTIA Cloud+.  After this course students will also be prepared to continue their education by taking CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar .

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ and CompTIA Cloud+ curriculum.

    Attendees to CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 8 days

    Course Objectives:

    • Learn the fundamental concepts of cloud computing
    • Learn the business aspects and impacts of cloud computing
    • Differentiate the types of cloud solutions and the adoptions measures for each
    • Identify the technical challenges and the mitigation measures involved in cloud computing
    • Identify the technical challenges and the mitigation measures involved in cloud computing
    • Identify the steps to successfully adopt cloud services
    • Identify the basic concepts of ITIL and describe how the ITIL framework is useful in the implementation of cloud computing in an organization
    • Identify the possible risks involved in cloud computing and the risk mitigation measures, and you will also identify the potential cost considerations for the implementation of cloud and its strategic benefits
    • Prepare to deploy cloud solutions
    • Deploy a pilot project
    • Test a pilot project deployment
    • Design a secure network for cloud deployment
    • Determine CPU and memory sizing for cloud deployments
    • Plan Identity and Access Management for cloud deployments
    • Analyze workload characteristics to ensure successful migration to the cloud
    • Secure systems to meet access requirements
    • Maintain cloud systems
    • Implement backup, restore, and business continuity measures
    • Analyze cloud systems for required performance
    • Analyze cloud systems for anomalies and growth forecasting
    • Troubleshoot deployment, capacity, automation, and orchestration issues
    • Troubleshoot connectivity issues
    • Troubleshoot security issues

    Course Prerequisites:

    • Security+, Network+ or equivalent experience
    • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!