Here are the General Unix course offerings:
Course Overview:
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
- Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
- Linux File, Directory, and Permissions Management
- Linux archives using tar and zip
- Interacting with BASH
- Review of Common Linux commands
- Sorting files by line or field
- Regular Expressions (meta character) with grep commands to locate specific lines in files
- Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
- Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
- Miscellaneous commands Tr, sort, cut, past, pr -Lab
- Performing non-interactive editing tasks with the sed command
- Writing simple sed scripts to perform complex editing tasks
- Using awk variables & arrays to sort data
- Employing awk programs to manipulate numeric & textual data
- Performing formatted printing in awk
- Writing simple awk programs to write reports from data files
- Using built-in awk functions & defining new functions
- Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
- Shell Review
- Shell Interpretation of Quotes & Backslash
- The Bash Shell
- Shell's combined with UNIX utilities
- Programming Basics
- Data Constructs
- Programming Looping
- Your Environment
- More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
- System Configuration / Kernel overview
- System Maintenance / Disk and file admin
- Using utilities for process control, locating files & automating maintenance tasks
- System Startup / Boot Process – LILO & GRUB Configuration
- Managing the Linux file system
- Customization of setup files
- Run Levels
- Network Services / Configuration
- User Management Monitoring, accessing & restricting root system access
- Administration Tools
- Process Control
- Client side components of NFS, Samba, NTP, NIS
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
- Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Facilities comments: Facility was fine
Liked the class? Then let everyone know!
Certified Offensive AI Security Professional (COASP) validates the competencies required for practitioners who need to demonstrate offensive AI security skills, emulating adversaries, validating defenses, and leading red-team/blue-team exercises to keep AI resilient, reliable, and auditable
The Certified Offensive AI Security Professional (COASP) equips you to identify and neutralize AI-specific threats before attackers do. And Bridges security, engineering, and data science so controls exist across the full AI life cycle.
Participants will gain hands-on experience to perform end-to-end adversarial testing and deliver defensive validation evidence including the ability to simulate adversarial AI kill chains, Harden AI architectures by secure system prompts, context windows, tool integrations, RAG pipelines, and agent memory, Conducting AI security assessments aligned to MITRE ATLAS, OWASP LLM/ML Top 10, NIST AI RMF, and DoD Test & Evaluation practices , This course covers how to build SOC-ready capabilities for AI-focused detection logic, incident playbooks, and forensic procedures , & how to execute prompt injection, adversarial prompting , Assess AI supply-chain risk , Implement defensive engineering controls and Produce assurance and compliance artifacts.
By the end of the course, learners will be well-prepared to take the Certified Offensive AI Security Professional (COASP) exam and demonstrate the ability to exploit vulnerabilities in LLMs and agents, and build defense that survive real world attacks, learners will master offensive techniques that break AI before the attackers do.
Course Outline:
01. Offensive AI and AI System Hacking Methodology
02. AI Reconnaissance and Attack Surface Mapping
03. AI Vulnerability Scanning and Fuzzing
04. Prompt Injection and LLM Application Attacks
05. Adversarial Machine Learning and Model Privacy Attacks
06. Data and Training Pipeline Attacks
07. Agentic AI and Model-to-Model Attacks
08. AI Infrastructure and Supply Chain Attacks
09. AI Security Testing, Evaluation, and Hardening
10. AI Incident Response and Forensics
Prerequisites:
AIE
Dates/Locations:
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).
Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
07/06/2026 - 07/10/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
- Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
- Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
- Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
- Optimize OSPFv2 and OSPFv3 behavior
- Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
- Implement route redistribution using filtering mechanisms
- Troubleshoot redistribution
- Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
- Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
- Optimize MP-BGP in IPv4 and IPv6 environments
- Troubleshoot MP-BGP for IPv4 and IPv6
- Describe the features of Multiprotocol Label Switching (MPLS)
- Describe the major architectural components of an MPLS VPN
- Identify the routing and packet forwarding functionalities for MPLS VPNs
- Explain how packets are forwarded in an MPLS VPN environment
- Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
- Implement Dynamic Host Configuration Protocol (DHCP)
- Describe the tools available to secure the IPV6 first hop
- Troubleshoot Cisco router security features
- Troubleshoot infrastructure security and services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of network fundamentals
- Basic knowledge of how to implement LANs
- General understanding of how to manage network devices
- General understanding of how to secure network devices
- Basic knowledge of network automation
Comments
Latest comments from students