Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.

TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.

 

Dates/Locations:

No Events

Duration: 2 days

Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.

Day 1

  • Module 0 – Introduction & Overview
  • Mod 1: Overview
    • Panorama Solution
    • Deployment Design
  • Mod 2: Initial Configuration
    • Interface Configuration
    • Setup Configurations
    • Device Deployment
    • Configuration Management
  • Mod 3: Templates
    • Templates Overview
    • Common Organization
    • Strategies
    • Configuring Templates
  • Mod 4: Device Groups
    • Device Groups
    • Objects
    • Policies
    • Device Group Commit

 

Day 2

  • Mod 5: Administration
    • Admin Roles and Access
    • Control
    • Commit Procedure
  • Mod 6: Logging and
    • Reporting
    • Logging
    • Application Command
    • Center
    • App-Scope
    • Correlation Objects
    • Reports
  • Mod 7: Log Collectors
    • Plan a Log Collection
    • Deployment
    • Distributed Data Collection
    • Log Deployment
    • Configure Dedicated Log
    • Collector
    • Managed Collector Groups
  • Mod 8: Business Continuity
    • Panorama High Availability
    • Collector Group
    • Redundancy
    • Export Configuration
    • Disk Installation

 

Prerequisites:

This course is in no way associated with Palo Alto Networks, Inc.

Comments

Latest comments from students


Like the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   

    Course Overview:

    This course begins by introducing you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure.

    The course continues to teach students how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring—taking your security operations to the next level.

    Attendees to CL-425: AWS Security Operations and Architecture will receive TechNow approved course materials and expert instruction.

    Duration: 5 Days

    Audience:
    • Security engineers
    • Security architects
    • Security analysts
    • Security auditors
    • Individuals who are responsible for governing, auditing, and testing an organization’s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines

    DoD 8140: Not Mandated

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisites:
    This course assumes you have the equivalent experience or have taken the AWS operational courses that are in the TechNow AWS track.
    CL-415: AWS Security Operations

    The above courses encapsulate prerequisite knowledge:
    • Experience with governance, risk, and compliance regulations and control objectives
    • Working knowledge of IT security practices
    • Working knowledge of IT infrastructure concepts
    • Familiarity with cloud computing concepts

    Course Objectives:

    This course teaches you how to:
    • Identify the security and compliance benefits of using the AWS cloud.
    • Discuss the AWS Shared Responsibility Model.
    • Describe the access control and access management features of AWS.
    • Use AWS services for security logging and monitoring.
    • Describe data encryption methods to secure sensitive data.
    • Describe AWS services used to protect network security.
    • Describe the basic steps to ensure strong governance of your AWS resources.
    • Identify AWS services used to maintain governance of control environments.
    • Use the AWS audit features.
    • Explain how to audit an AWS environment.
    • Explain the AWS compliance and assurance programs.
    • Describe how AWS audits and attestations validate that security controls are implemented and operating effectively.
    • Assimilate and leverage the AWS shared security responsibility model.
    • Mange user identity and access management in the AWS cloud.
    • Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.
    • Implement better security controls for your resources in the AWS cloud.
    • Manage and audit your AWS resources from a security perspective.
    • Monitor and log access and usage of AWS compute, storage, networking, and database services.
    • Analyze events by capturing, monitoring, processing, and analyzing logs.
    • Identify AWS services and tools to help automate, monitor, and manage security operations on AWS.
    • Perform security incident management in the AWS cloud.
    • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied. The assessment outline deals both with AWS specifics and also lays down the workflow of NIST, FedRAMP, and Cloud Security Alliance STAR compliance for a deployed AWS solution.

    Dates/Locations:

    No Events

    Course Outline:

    Day 1
    • Introduction to Cloud Computing and AWS Security
    • Access Control and Management
    • AWS Security: Governance, Logging, and Encryption
    • Compliance and Risk Management

    Day 2
    • Introduction to Cloud Security Course Objectives
    • Security of the AWS Cloud: Entry Points, Web Application, Communications, and Incident Response.
    • Cloud Aware Governance and Compliance and related control frameworks.
    • Identity and Access Management
    Day 3
    • Securing AWS Infrastructure Services
    • Securing AWS Container Services
    • Securing AWS Abstracted Services
    • Using AWS Security Services
    Day 4
    • Data Protection in the AWS Cloud
    • Managing security in a hybrid environment
    • Deep dive into AWS monitoring and log analysis
    • Protecting against outside threats to AWS VPC
    Day 5
    • How to carry out a Pentest on an AWS solution
    • Security Incident Management and Automating security and incident response
    • Threat detection and monitoring sensitive data
    • Lets Do it! Building Compliant Workloads on AWS—Case Study

     

     

    Course Overview:

    CT-225: Network+ is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client. The course also helps to prepare students for three popular certification examinations: CompTIA Network+, Microsoft Networking Essentials, and Novell Networking Technologies.

    Attendees to CT-225: Network+ will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    08/25/2025 - 08/29/2025
    08:00 -16:00
    CT-225: Network+
    TechNow, Inc, San Antonio TX
    12/15/2025 - 12/19/2025
    08:00 -16:00
    CT-225: Network+
    TechNow, Inc, San Antonio TX

    Duration 5 days

    Course Objectives:

    • Identify basic network theory concepts and major network communications methods
    • Describe bounded network media
    • Describe unbounded network media
    • Identify the major types of network implementations
    • Identify TCP/IP addressing and data delivery methods
    • Analyze routing and switching technologies
    • Identify the components of a TCP/IP implementation
    • Analyze network security
    • Implement network security
    • Identify the components of a WAN implementation
    • Identify the components used in cloud computing and virtualization
    • Identify the components of a remote network implementation
    • Manage networks
    • Troubleshoot network issues

    Prerequisites:

    Comments

    Latest comments from students


    User: hanbri9

    Instructor comments: Great instructor.

    Facilities comments: BEST HOTEL!!!!!!! AMAZING LOCATION, GOOD FOOD, NICE SPACE. The location of the hotel is what is almost the best about it. Driving up hwy 10 in the morning is absolutely awful.



     

    Like the class?  Then let everyone know!

    Course Overview:

    This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years.  This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux.  RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course.  The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux.  The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.

    Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    Day 1 and 2: Unix Review and Unix  Utilities

    • Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
    • Linux File, Directory, and Permissions Management
    • Linux  archives using tar and zip
    • Interacting with BASH
    • Review of Common Linux commands
    • Sorting files by line or field
    • Regular Expressions (meta character) with grep commands to locate specific lines in files
    • Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
    • Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
    • Miscellaneous commands Tr, sort, cut, past, pr -Lab
    • Performing non-interactive editing tasks with the sed command
    • Writing simple sed scripts to perform complex editing tasks
    • Using awk variables & arrays to sort data
    • Employing awk programs to manipulate numeric & textual data
    • Performing formatted printing in awk
    • Writing simple awk programs to write reports from data files
    • Using built-in awk functions & defining new functions
    • Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
     
    Day 3 – Intro to Programming / Shell Scripting
    • Shell Review
    • Shell Interpretation of Quotes & Backslash
    • The Bash Shell
    • Shell's combined with UNIX utilities
    • Programming Basics
    • Data Constructs
    • Programming Looping
    • Your Environment
    • More on Parameters

    Day 4 and 5 – Security Fundamentals, Linux Administration

    • System Configuration / Kernel overview 
    • System Maintenance / Disk and file admin
    • Using utilities for process control, locating files & automating maintenance tasks
    • System Startup / Boot Process – LILO & GRUB Configuration
    • Managing the Linux file system
    • Customization of setup files
    • Run Levels
    • Network Services / Configuration
    • User Management Monitoring, accessing & restricting root system access
    • Administration Tools
    • Process Control
    • Client side components of NFS, Samba, NTP, NIS
    • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.

    Prerequisites:

    • Prior UNIX/Linux experience or training

    Comments

    Latest comments from students


    User: mikenaya

    Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.

    Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.


    User: fquinene

    Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.

    Facilities comments: Facility was fine


    Liked the class?  Then let everyone know!