Here are the General Unix course offerings:
Course Overview:
CT-225: Network+ is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client. The course also helps to prepare students for three popular certification examinations: CompTIA Network+, Microsoft Networking Essentials, and Novell Networking Technologies.
Attendees to CT-225: Network+ will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Date/Time | Event |
---|---|
08/25/2025 - 08/29/2025 08:00 -16:00 |
CT-225: Network+ TechNow, Inc, San Antonio TX |
12/15/2025 - 12/19/2025 08:00 -16:00 |
CT-225: Network+ TechNow, Inc, San Antonio TX |
Duration 5 days
Course Objectives:
- Identify basic network theory concepts and major network communications methods
- Describe bounded network media
- Describe unbounded network media
- Identify the major types of network implementations
- Identify TCP/IP addressing and data delivery methods
- Analyze routing and switching technologies
- Identify the components of a TCP/IP implementation
- Analyze network security
- Implement network security
- Identify the components of a WAN implementation
- Identify the components used in cloud computing and virtualization
- Identify the components of a remote network implementation
- Manage networks
- Troubleshoot network issues
Prerequisites:
- A+ Certification Course is recommended
Comments
Latest comments from students
User: hanbri9
Instructor comments: Great instructor.
Facilities comments: BEST HOTEL!!!!!!! AMAZING LOCATION, GOOD FOOD, NICE SPACE. The location of the hotel is what is almost the best about it. Driving up hwy 10 in the morning is absolutely awful.
Like the class? Then let everyone know!
Course Overview:
This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.
NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment
Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
Date/Time | Event |
---|---|
09/03/2025 - 09/05/2025 08:00 -16:00 |
AZ-900: Microsoft Azure Fundamentals TechNow, Inc, San Antonio TX |
Course Duration: 3 days
Course Outline:
- Cloud Concepts
- Core Azure Services
- Security, Privacy, Compliance, And Trust
- Azure Pricing and Support
Lab Objectives:
-
- Create a virtual machine
- Deploy Azure container instances
- Create a virtual network
- Create blob storage
- Create a SQL database
- Implement an Azure IoT Hub
- Implement Azure Functions
- Create a web app
- Create a VM with a Template
- Create a VM with PowerShell
- Create a VM with CLI
- Secure network traffic
- Implement Azure key vault
- Create an Azure Policy
- Manage access with RBAC
- Manage resource locks
- Implement resource tagging
- Exploring the Trust Center
- Use the Azure Pricing Calculator
- Use the Azure TCO Calculator
- Open a Support request
- Calculate composite SLAs
- Access Azure Preview features
Prerequisites :
-
-
- There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
- This course is suitable for IT personnel who are just beginning to work with Azure.
- This course primarily uses the Azure portal to create services and does not require scripting skills.
- Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
- This course provides an Azure pass and optional lab environment.
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:
Date/Time | Event |
---|---|
10/06/2025 - 10/10/2025 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- The IS Audit Process (10%)
- Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
- IT Governance (15%)
- Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
- System and Infrastructure Life Cycle Management (16%)
- Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
- IT Service Delivery and Support (14%)
- Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
- Protection of Information Assets (31%)
- Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
- Business Continuity and Disaster Recovery (14%)
- Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone Know!
Course Overview:
This course explores the VMware Infrastructure and related security, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure including security. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments with security practices included. Extensive hands-on labs provide for a rich student experience.
Hypervisors and their supporting environment require attention to security due to the aggregated risk of hosting multiple virtual servers. This course explores the security of virtualized environments. Student configure ESXi by learning to manage the security and risk between ESXi, virtual servers and security integration of ESXi to the physical network infrastructure including appropriate segregation from other sensitive networks and management networks. How to configure virtual networks when some hosts are dual or multi homed, but internally segregate between the two or more connected networks with different security levels. Appropriate integration of zero-clients and thin clients. Configuration of defensive measures on hosts, servers, hypervisors within the virtual environment and practices for those guarding it externally. Integration of Active Directory and other AAA/CIA related services relative to a virtualized environment.
Students are also walked through DoD ESXi Security Technical Implementation Guide (STIG). Introduction to the impact of Intel Trusted Execution Technology integrated with ESXi to create a trusted platform for virtual machines. Additionally the instructor walks the students through NIST Special Publication 800-125A: Security Recommendations for Hypervisor Deployment on Servers, and NIST Special Publication 800-125B: Secure Virtual Network Configuration for Virtual Machine (VM) Protection.
Attendees to “VM-345: VMware Infrastructure Security: VMware Install, Configure, and Manage with Security Objectives” will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
• Virtual Infrastructure Overview
• ESX and ESXi Server Installation
• Configuration of Networking, Scalability and Security
• Storage
• Install and Configure vCenter Server and Components
• Creation, Deployment, Management, and Migration of Virtual Machines
• Utilize vCenter Server for Resource Management
• Utilize vCenter Server for Virtual Machine Access Control and User Managment
• Use vCenter Server to increase scalability
• Monitoring Your Environment
• Data & Availability Protection Troubleshooting
• Use VMware vCenter Update Manager to apply ESXi patches
• Use vCenter Server to manage vMotion, HA, DRS and data protection.