Welcome to TechNow! The Leader in Information Security Training & Computer Training.
The world of information security and computer training is ever changing. The techniques and systems continue to evolve and we must stay current and diligent. To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.
TechNow® has been training the leaders in the computer community for many years. We provide training for students in a number of areas. Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more. With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.
TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
Linux File, Directory, and Permissions Management
Linux archives using tar and zip
Interacting with BASH
Review of Common Linux commands
Sorting files by line or field
Regular Expressions (meta character) with grep commands to locate specific lines in files
Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
Performing non-interactive editing tasks with the sed command
Writing simple sed scripts to perform complex editing tasks
Using awk variables & arrays to sort data
Employing awk programs to manipulate numeric & textual data
Performing formatted printing in awk
Writing simple awk programs to write reports from data files
Using built-in awk functions & defining new functions
Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
Day 3 – Intro to Programming / Shell Scripting
Shell Review
Shell Interpretation of Quotes & Backslash
The Bash Shell
Shell's combined with UNIX utilities
Programming Basics
Data Constructs
Programming Looping
Your Environment
More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
System Configuration / Kernel overview
System Maintenance / Disk and file admin
Using utilities for process control, locating files & automating maintenance tasks
System Startup / Boot Process – LILO & GRUB Configuration
Managing the Linux file system
Customization of setup files
Run Levels
Network Services / Configuration
User Management Monitoring, accessing & restricting root system access
Administration Tools
Process Control
Client side components of NFS, Samba, NTP, NIS
Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
This course is developed for those individuals seeking to pass the Project Management Institute’s PMP certification exam, as well as any individual who has attended any Project Management Certification program in the past and needs to brush up on the material needed to pass the PMP exam.
Attendees to PM-325: Project Management Professional (PMP) Exam Preparation will receive official PMI (Project Management Institute) course materials and expert instruction from an official PMI Instructor.
TechNow Inc. is an official Authorized Training Partner of The Project Management Institute (PMI).
This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).
Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.
Date/Location:
No Events
Duration: 5 days
Course Objectives:
Designing a Logical Architecture
Planning Service Application Architecture
Planning for Performance and Capacity
Designing a Physical Architecture
Designing a Security Plan
Planning Authentication
Planning Managed Metadata
Planning Social Computing
Designing Enterprise Search Strategy
Planning Enterprise Content Management
Developing a Plan for Governance
Designing a Maintenance and Monitoring Plan
Prerequisites:
At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
At least one year’s experience of mapping business requirements to logical and physical technical design
Working knowledge of network design, including network security