Here are our Microsoft Programming courses:
Course Overview:
This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform. The course focuses on C# program structure, language syntax & implementation details. C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++. It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.
Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of the Microsoft .NET Platform Overview of C#
- Using Value-Type Variables
- Statements & Exceptions
- Methods & Parameters
- Arrays
- Essentials of Object-Oriented Programming
- Using Reference-Type Variables
- Creating & Destroying Objects
- Inheritance in C#
- Aggregation, Namespaces & Advanced Scope
- Operators & Events Properties & Indexes
- Attributes
Prerequisites:
- Experience with programming in C, C++, Visual Basic, Java or another programming language
Comments
Latest comments from students
User: jdmccol
Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.
Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.
Liked the class? Then let everyone know!
Course Overview:
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
- Learn about Containers, Docker, Kubernetes, and OpenShift architecture
- Overview DoD Enterprise DevSecOps Platform (DSOP) Reference Design and DoD Cloud Platform One (P1)
- Tie together awareness of various DoD Cloud offerings and their relationships
- Create containerized services
- Manage containers and container images
- Deploy multi-container applications
- Install an OpenShift cluster
- Configure and manage masters and nodes
- Secure OpenShift
- Control access to resources on OpenShift
- Monitor and collect metrics on OpenShift
- Deploy applications on OpenShift using source-to-image (S2I)
- Manage storage on OpenShift
Course Outline:
- Getting started with container technology
- Creating containerized services
- Managing containers
- Managing container images
- Creating custom container images
- Deploying containerized applications on OpenShift
- Deploying multi-container applications
- Troubleshooting containerized applications
- Comprehensive Review of Introduction to Container, Kubernetes, and RedHat OpenShift
- Introducing Red Hat OpenShift Container Platform
- Installing OpenShift Container Platform
- Describing and exploring OpenShift networking concepts
- Executing commands
- Controlling access to OpenShift resources
- Allocating persistent storage
- Managing application deployments
- Installing and configuring the metrics subsystem
- Managing and monitoring OpenShift Container Platform
Dates/Locations:
Duration: 5 Days
Prerequisites:
- Ability to use a Linux® terminal session and issue operating system commands
- Good foundation in Linux
- Experience with web application architectures and their corresponding technologies
Target Audience:
- Developers who wish to containerize software applications
- Administrators who are new to container technology and container orchestration
- Architects who are considering using container technologies in software architectures
- System administrators
- System architects
- Architects and developers who want to install and configure OpenShift Container Platform
- Those working in the field of DevSecOps supporting DoD Platform One (P1) and other implementations
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).
Duration: 5 Days
Audience:
Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.
Course Prerequisites:
We recommend that attendees of this course have the following prerequisite:
• Network+
Dates/Locations:
Course Outline:
DAY ONE
Course Set Up and Analyzer Testing
Network Analysis Overview
Wireshark Functionality Overview
Capturing Wired and Wireless Traffic
Define Global and Personal Preferences for Faster Analysis
Defined Time Values and Interpret Summaries
Interpret Basic Trace File Statistics to Identify Trends
Create and Apply Display Filters for Efficient Analysis
DAY TWO
Follow Streams and Reassemble Data
Use Wireshark’s Expert System to Identify Anomalies
TCP/IP Analysis Overview
Analyze Common TCP/IP Traffic Patterns
DAY THREE
Graph I/O Rates and TCP Trends
802.11 (WLAN) Analysis Fundamentals
Voice over IP (VoIP) Analysis Fundamentals
Network Forensics Fundamentals
DAY FOUR
Detect Scanning and Discovery Processes
Analyze Suspect Traffic
DAY FIVE
Use Command‐Line Tools
Course Overview:
The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network. Let us help you prepare for the CompTIA Security+ exam (SY0-701).
TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.
Attendees to CT-325: Security+ will receive TechNow approved course materials and TechNow expert instruction.

Dates/Locations:
Date/Time | Event |
---|---|
10/27/2025 - 10/31/2025 08:00 -20:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
12/15/2025 - 12/19/2025 08:00 -16:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Compare and contrast attacks
- Compare and contrast security controls
- Use security assessment tools
- Explain basic cryptography concepts
- Implement a public key infrastructure
- Implement identity and access management controls
- Manage access services and accounts
- Implement a secure network architecture
- Install and configure security appliances
- Install and configure wireless and physical access security
- Deploy secure host, mobile, and embedded systems
- Implement secure network access protocols
- Implement secure network applications
- Explain risk management and disaster recovery concepts
- Describe secure application development concepts
- Explain organizational security concepts
Prerequisites:
- CompTIA A+ and Network+ certifications, or equivalent knowledge.
- Windows 7/8/10 and Server 2008/2012/2016 experience required.
- Six to nine months experience in networking, including experience in configuring & managing TCP/IP.
Comments
Latest comments from students
User: joshjepsen@hotmail.com
Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.