Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • CT-325: Security+
    • 08/18/2025 – 08/22/2025
    • San Antonio
  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • in   
     

    Course Overview:

    The focus of Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL110) will be managing OpenStack using both the web-based dashboard and the command-line interface, in addition to managing instances and installing a proof-of-concept environment using Red Hat OpenStack Platform (RHOSP) director. Essential skills covered in the course include configuring Red Hat OpenStack Platform (using the director UI); managing users, projects, flavors, roles, images, networking, and block storage; setting quotas; and configuring images at instantiation.

    Attendees to CL-115 Red Hat OpenStack Administration I: Core Operations for Cloud Operators will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Prerequisites:

    This course is designed for Linux system administrators, cloud administrators, and cloud operators interested in, or responsible for, maintaining a private or hybrid cloud.

    Prerequisites for this course is Red Hat Certified System Administrator (RHCSA) or demonstrate equivalent experience

    Course Outline:

    • Launch an instance
    • Manage projects, quotas, and users
    • Manage networks, subnets, routers, and floating IP adresses
    • Create and manage block and object storage in the OpenStack framework
    • Customize instances with cloud-init
    • Deploy scalable stacks
    • Deploy RedHat OpenStack Platform using RHOSP director

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to maintaining a database.

    Attendees to MS-6231: Maintaining a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Installing and Configuring SQL Server
    • Managing Databases and Files
    • Disaster Recovery
    • Managing Security
    • Transferring Data
    • Automating Administrative Tasks
    • Implementation Replication
    • Maintaining High Availability
    • Monitoring SQL Server
    • Troubleshooting and Performance Tuning

    Prerequisites:

    • None

    Comments

    Latest comments from students


    User: angelangeles

    Instructor comments: Clay was knowledgeable instructor with enough experience to make subject matter relatable to real world usage.



     

    Liked the class?  Then let everyone know!

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

     

    Course Overview: 

     

    This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles.  This leads to the processes of confirming the validity and usability for quality of the product development.  An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.

    Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 2 Days

    Course Objectives: At the conclusion of this course, students will be able to:

    • Understand the Scrum Flow, the core components of the Scrum framework
    • Understand the scope of the Product Owner role in detail
    • Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
    • Understand the scope of the Scrum Master role at a high level
    • Understand the scope of the Scrum Development Team roles
    • Document the interactions between the user of a system and the system itself
    • Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format

     

    Target Student:

    • Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!