Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   
      

     

    Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.

    TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.

     

    Dates/Locations:

    No Events

    Duration: 2 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.

    Day 1

    • Module 0 – Introduction & Overview
    • Mod 1: Overview
      • Panorama Solution
      • Deployment Design
    • Mod 2: Initial Configuration
      • Interface Configuration
      • Setup Configurations
      • Device Deployment
      • Configuration Management
    • Mod 3: Templates
      • Templates Overview
      • Common Organization
      • Strategies
      • Configuring Templates
    • Mod 4: Device Groups
      • Device Groups
      • Objects
      • Policies
      • Device Group Commit

     

    Day 2

    • Mod 5: Administration
      • Admin Roles and Access
      • Control
      • Commit Procedure
    • Mod 6: Logging and
      • Reporting
      • Logging
      • Application Command
      • Center
      • App-Scope
      • Correlation Objects
      • Reports
    • Mod 7: Log Collectors
      • Plan a Log Collection
      • Deployment
      • Distributed Data Collection
      • Log Deployment
      • Configure Dedicated Log
      • Collector
      • Managed Collector Groups
    • Mod 8: Business Continuity
      • Panorama High Availability
      • Collector Group
      • Redundancy
      • Export Configuration
      • Disk Installation

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!

    Course Overview:

    This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment.  It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements.  The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and  40% lab time.

    Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Overview of Business Analysis Workshop
    • Eliciting Project Workshop
    • Case Study
    • Analyzing Requirements and Writing Case Studies
    • Case Study

    Prerequisites:

    • None

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    TechNow has been involved in enterprise security architectures and education since 1990.  TechNow’s training program has followed the evolution of enterprise computing into security architectures.  Palo Alto Networks represents the current state of security product evolution.  With next generation firewall technology, the reunification of your security architecture is possible.  TechNow can present the ramifications of many centralized strategies.  All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
    Palo Alto Networks Certifications:  Accredited Configuration Engineer (ACE) take EDU-201; Palo Alto Networks Certified Network Security Engineer (PCNSE) take  EDU-201 + EDU-205 + EDU-221
    TechNow is a mobile Pearson VUE Authorized Testing Center.  Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course.  Take the course and get certfied, without  logistical effort of getting students to a training facility and the hassle of scheduling testing.
    TechNow, Inc. is not associated in any way with Palo Alto Networks, Inc.
    in   
      

    Course Overview:

    TechNow’s CCSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Cloud Security Professional exam.  The exam covers (ISC)²’s 6 Domains from the Common Body of Knowledge, which encompass the whole of cloud security.

    This course is an intense 5 day program.  TechNow has a proven training and certification track record that you can depend on.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.   The instructor takes time to walk through scenarios that assume comprehensive knowledge of enterprise infrastructures.

    Attendees to CL-315: CCSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

    The 6 domains of the CCSP CBK:

    • Architectural Concepts & Design Requirements
    • Cloud Data Security
    • Cloud Platform & Infrastructure Security
    • Cloud Application Security
    • Operations
    • Legal & Compliance

    Duration: 5 days

    Audience:  Mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.   CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.

    DoD 8140:  Not Mandated

    Course Prerequisites:  IT professional with 5 years of experience, 3 years of security experience, and at least 1 year of cloud security experience.  GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.  This course is for those who are already qualified at the enterprise level for IT infrastructures, have Cloud experience, and are looking for a Cloud Security certification.

    Course Objectives:

    Domain 1: Architectural Concepts and Design Requirements

    • Module 1: Understand cloud computing concepts
    • Module 2: Describe cloud reference architecture
    • Module 3: Understand security concepts relevant to cloud computing
    • Module 4: Understand design principles of secure cloud computing
    • Module 5: Identify trusted cloud services

    Domain 2: Cloud Data Security

    • Module 1: Understand Cloud Data Life Cycle
    • Module 2: Design and Implement Cloud Data Storage Architectures
    • Module 3: Understand and implement Data Discovery and Classification Technologies
    • Module 4: Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
    • Module 5: Design and implement Data Rights Management
    • Module 6: Plan and Implement Data Retention, Deletion, and Archival policies
    • Module 7: Design and Implement Auditability, Traceability, and Accountability of Data Events

    Domain 3: Cloud Platform Infrastructure Security

    • Module 1: Comprehend Cloud Infrastructure Comp
    • Module 2: Analyze Risks Associated to Cloud Infrastructure
    • Module 3: Design and Plan Security Controls
    • Module 4: Plans Disaster Recovery & Business Continuity Management

    Domain 4: Cloud Application Security

    • Module 1: Recognize Need for Training and Awareness in Application Security
    • Module 2: Understand Cloud Software Assurance and Validation
    • Module 3: Use Verified Secure Software
    • Module 4: Comprehend the Software Development Life Cycle (SDLC) Process
    • Module 5: Apply the Secure Software Development Life Cycle
    • Module 6: Comprehend the Specifics of Cloud Application Architecture
    • Module 7: Design Appropriate Identity and Access Management (IAM) Solutions

    Domain 5: Operations

    • Module 1: Support the Planning Process for the Data Center Design
    • Module 2: Implement and Build Physical Infrastructure for Cloud Environment
    • Module 3: Run Physical Infrastructure for Cloud Environment
    • Module 4: Manage Physical Infrastructure for Cloud Environment
    • Module 5: Build Logical Infrastructure for Cloud Environment
    • Module 6: Run Logical Infrastructure for Cloud Environment
    • Module 7: Manage Logical Infrastructure for Cloud Environment
    • Module 8: Ensure Compliance with Regulations and Controls
    • Module 9: Conduct Risk Assessment to Logical and Physical Infrastructure
    • Module 10: Understand the Collection and Preservation of Digital Evidence
    • Module 11: Manage Communications with Relevant Parties

    Domain 6: Legal and Compliance

    • Module 1: Understand Legal Requirements and Unique Risks Within the Cloud Environment
    • Module 2: Understand Privacy Issues, Including Jurisdictional Variances
    • Module 3: Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
    • Module 4: Understand Implication of Cloud to Enterprise Risk Management
    • Module 5: Understand Outsourcing and Cloud Contract Design
    • Module 6: Execute Vendor Management

    Dates/Locations:

    No Events

     

    Comments

    Latest comments from students


    User: mrotek

    Instructor comments: Dave is an excellent instructor. Very knowledgeable on many levels of technology.


    User: fella

    Instructor comments: Very knowledgeable the security arena.

    Facilities comments: At our office.



    Next/Related Courses:

    CISSP Certification Seminar