TechNow provides a wide variety of skills based computer training and testing.  With our Headquarters in San Antonio, TX, we have provided services including computer training around the United States to many individuals and corporations.

Our products and services are designed for those who are seeking to expand their knowledge base, whether with one class or a series of classes to gain certification in specific areas of training.

Our talented and knowledgeable instructors enjoy teaching and sharing their skills; allowing you to expand and learn essential computer skills.

 

This is a list of some of our Products and Services

Hardware, Software, and Consulting

Classroom in a Box

Authorized Testing Center

Customized Training

in   

 

Course Overview:

This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.

Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.

Date/Locations:

Date/Time Event
07/13/2026 - 07/17/2026
08:00 -16:00
TN-125: Introduction to UNIX and Linux
TechNow, Inc, San Antonio TX
10/19/2026 - 10/23/2026
08:00 -16:00
TN-125: Introduction to UNIX and Linux
TechNow, Inc, San Antonio TX

Duration: 5 days

Course Objectives:

  • Unix Overview
  • Introduction to the UNIX command Line
  • Managing and controlling access to files
  • Batch Scripting and tools
  • Regular Expressions, Pipelines, and IO Redirection
  • Text File Manipulation
  • Basic Network Commands
  • Managing Unix Processes
  • GNOME Graphical Desktop

Prerequisites:

  • Basic Knowledge of Computers

Comments

Latest comments from students



User: trkdashin

Instructor comments: Very knowledgeable

Facilities comments: Nice Hotel


 

Liked the class?  Then let everyone know!

Course Overview:

 Cisco DoD Comply-to-Connect (C2C) course teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.

This training also earns you 32 Continuing Education (CE) credits toward recertification.

Dates/Locations:

No Events

Duration: 5 days

 

Course Outline: 

Section 1: C2C Fundamentals

  • Comply to Connect Overview
  • From C2C to ZTA
  • Steps to Implement C2C

Section 2: Cisco Identity-Based Networking Services

  • Cisco IBNS Overview
  • AAA Role in Cisco IBNS
  • Compare Cisco IBNS and Cisco ISE Solutions
  • Explore Cisco IBNS Architecture Components

Section 3: Introducing Cisco ISE Architecture

  • Cisco ISE as a Network Access Policy Engine
  • Cisco ISE Use Cases
  • Cisco ISE Functions

Section 4: Introducing Cisco ISE Deployment

  • Cisco ISE Deployment Models
  • Cisco ISE Licensing and Network Requirements
  • Cisco ISE Context Visibility Features
  • New Features in Cisco ISE 3.X

Section 5: Introducing Cisco ISE Policy Enforcement Components

  • 802.1X for Wired and Wireless Access
  • MAC Authentication Bypass for Wired and Wireless Access
  • Identity Management
  • Active Directory Identity Source
  • Additional Identity Sources
  • Certificate Services

Section 6: Introducing Cisco ISE Policy Configuration

  • Cisco ISE Policy
  • Cisco ISE Authentication Rules
  • Cisco ISE Authorization Rules

Section 7: PKI and Advanced Supplicants

  • Public Key Infrastructure (PKI)
  • TEAP in Comply to Connect (C2C)
  • Secure Client ISE features and Configuration for C2C

Section 8: Introducing the Cisco ISE Profiler

  • Web Access with Cisco ISE
  • ISE Profiler
  • Cisco ISE Probes
  • Profiling Policy
  • Custom Attributes in Profile

Section 9: Introducing Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance Services Overview

Section 10: Configuring Client Posture Services and Compliance

  • Client Posture Services and Provisioning Configuration

Section 11: Introducing Profiling Best Practices and Reporting

  • Profiling Best Practices

Section 12: C2C Use Cases

  • Cisco CX ISE Reporting Tool
  • ISE Reporting
  • ISE Hardening
  • Profiling Best Practices for C2C

Section 13: C2C Third-Party Integrations-Tenable

  • Tenable Use Case
  • Tenable Overview and Capabilities
  • Tenable Integration Prerequisites
  • Tenable Integration Configuration
  • Policy Design
  • Policy Enforcement
  • Enforcement Verification

Section 14: C2C Third-Party Integrations-MECM

  • MECM Use Case
  • MECM Overview and Capabilities
  • MECM Integration Prerequisites
  • MECM Integration Configuration
  • Policy Design
  • Policy Enforcement
  • Enforcement Verification

Section 15: C2C Third-Party Integrations-Trellix

  • Trellix Use Case
  • Trellix Overview and Capabilities
  • Trellix Integration Prerequisites
  • Trellix Integration Configuration
  • Policy Enforcement
  • Enforcement Verification

Section 16: Troubleshooting Cisco ISE Policy and Third-Party NAD

  • Cisco ISE Third-Party Network Access Device Support
  • Troubleshooting Cisco ISE Policy Configuration

Section 17: Exploring Cisco TrustSec

  • Cisco TrustSec Overview
  • Cisco TrustSec Enhancements
  • Cisco TrustSec Configuration

Section 18: Working with Network Access Devices

  • Reviewing AAA
  • Cisco ISE TACACS+ Device Administration
  • Configuring TACACS+ Device Administration
  • TACACS+ Device Administration Guidelines and Best Practices

 

Course Prerequisites: 

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with 802.1X
  • Familiarity with Microsoft Windows Operating Systems
  • Familiarity with Cisco IOS CLI for wired and wireless network devices
  • Familiarity with Cisco Identity Service Engine

Course Overview:

The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).

Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.

Dates/Locations:

Date/Time Event
07/06/2026 - 07/10/2026
08:00 -16:00
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
TechNow, Inc, San Antonio TX
10/19/2026 - 10/23/2026
08:00 -16:00
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
  • Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
  • Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
  • Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
  • Optimize OSPFv2 and OSPFv3 behavior
  • Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
  • Implement route redistribution using filtering mechanisms
  • Troubleshoot redistribution
  • Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
  • Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
  • Optimize MP-BGP in IPv4 and IPv6 environments
  • Troubleshoot MP-BGP for IPv4 and IPv6
  • Describe the features of Multiprotocol Label Switching (MPLS)
  • Describe the major architectural components of an MPLS VPN
  • Identify the routing and packet forwarding functionalities for MPLS VPNs
  • Explain how packets are forwarded in an MPLS VPN environment
  • Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
  • Implement Dynamic Host Configuration Protocol (DHCP)
  • Describe the tools available to secure the IPV6 first hop
  • Troubleshoot Cisco router security features
  • Troubleshoot infrastructure security and services

Prerequisites:

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

TechNow,Inc is an Accredited Training Center. As an ATC we are authorized to conduct EC-Council curriculum courses. Students will receive official EC-Council Curriculum and access to iLabs and when applicable access to EC-Council Cyber Range.


Here are the EC-Council course offerings:

in