Course Overview:

 

Install, configure, and manage Red Hat JBoss Enterprise Application Platform

Red Hat JBoss® Application Administration I teaches you the best practices for installing and configuring Red Hat JBoss Enterprise Application Platform 6. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively deploy and manage applications on JBoss Enterprise Application Platform.

Attendees to RH-345: Red Hat JBoss Application Administration I, will receive TechNow approved course materials and expert instruction.

Dates/Locations:

Duration: 5 Days

Course Objectives:

  • Overview of JBoss Enterprise Application Platform
  • Configure JBoss Enterprise Application Platform in standalone mode
  • Configure JBoss Enterprise Application Platform in domain mode
  • Configure servers
  • Use the CLI tool
  • The datasource subsystem
  • The logging subsystem
  • The messaging subsystem
  • The security subsystem
  • JVM configuration
  • Migrating applications to JBoss Enterprise Application Platform 6
  • The web subsystem

Prerequisites:

  • Linux System Administration

Comments

Latest comments from students


 

  

Liked the class?  Then let everyone know!

  

 

Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.

TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.

 

Dates/Locations:

No Events

Duration: 2 days

Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.

Day 1

  • Module 0 – Introduction & Overview
  • Mod 1: Overview
    • Panorama Solution
    • Deployment Design
  • Mod 2: Initial Configuration
    • Interface Configuration
    • Setup Configurations
    • Device Deployment
    • Configuration Management
  • Mod 3: Templates
    • Templates Overview
    • Common Organization
    • Strategies
    • Configuring Templates
  • Mod 4: Device Groups
    • Device Groups
    • Objects
    • Policies
    • Device Group Commit

 

Day 2

  • Mod 5: Administration
    • Admin Roles and Access
    • Control
    • Commit Procedure
  • Mod 6: Logging and
    • Reporting
    • Logging
    • Application Command
    • Center
    • App-Scope
    • Correlation Objects
    • Reports
  • Mod 7: Log Collectors
    • Plan a Log Collection
    • Deployment
    • Distributed Data Collection
    • Log Deployment
    • Configure Dedicated Log
    • Collector
    • Managed Collector Groups
  • Mod 8: Business Continuity
    • Panorama High Availability
    • Collector Group
    • Redundancy
    • Export Configuration
    • Disk Installation

 

Prerequisites:

This course is in no way associated with Palo Alto Networks, Inc.

Comments

Latest comments from students


Like the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   

    Course Overview:

    This course begins by introducing you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure.

    The course continues to teach students how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring—taking your security operations to the next level.

    Attendees to CL-425: AWS Security Operations and Architecture will receive TechNow approved course materials and expert instruction.

    Duration: 5 Days

    Audience:
    • Security engineers
    • Security architects
    • Security analysts
    • Security auditors
    • Individuals who are responsible for governing, auditing, and testing an organization’s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines

    DoD 8140: Not Mandated

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisites:
    This course assumes you have the equivalent experience or have taken the AWS operational courses that are in the TechNow AWS track.
    CL-415: AWS Security Operations

    The above courses encapsulate prerequisite knowledge:
    • Experience with governance, risk, and compliance regulations and control objectives
    • Working knowledge of IT security practices
    • Working knowledge of IT infrastructure concepts
    • Familiarity with cloud computing concepts

    Course Objectives:

    This course teaches you how to:
    • Identify the security and compliance benefits of using the AWS cloud.
    • Discuss the AWS Shared Responsibility Model.
    • Describe the access control and access management features of AWS.
    • Use AWS services for security logging and monitoring.
    • Describe data encryption methods to secure sensitive data.
    • Describe AWS services used to protect network security.
    • Describe the basic steps to ensure strong governance of your AWS resources.
    • Identify AWS services used to maintain governance of control environments.
    • Use the AWS audit features.
    • Explain how to audit an AWS environment.
    • Explain the AWS compliance and assurance programs.
    • Describe how AWS audits and attestations validate that security controls are implemented and operating effectively.
    • Assimilate and leverage the AWS shared security responsibility model.
    • Mange user identity and access management in the AWS cloud.
    • Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.
    • Implement better security controls for your resources in the AWS cloud.
    • Manage and audit your AWS resources from a security perspective.
    • Monitor and log access and usage of AWS compute, storage, networking, and database services.
    • Analyze events by capturing, monitoring, processing, and analyzing logs.
    • Identify AWS services and tools to help automate, monitor, and manage security operations on AWS.
    • Perform security incident management in the AWS cloud.
    • Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied. The assessment outline deals both with AWS specifics and also lays down the workflow of NIST, FedRAMP, and Cloud Security Alliance STAR compliance for a deployed AWS solution.

    Dates/Locations:

    No Events

    Course Outline:

    Day 1
    • Introduction to Cloud Computing and AWS Security
    • Access Control and Management
    • AWS Security: Governance, Logging, and Encryption
    • Compliance and Risk Management

    Day 2
    • Introduction to Cloud Security Course Objectives
    • Security of the AWS Cloud: Entry Points, Web Application, Communications, and Incident Response.
    • Cloud Aware Governance and Compliance and related control frameworks.
    • Identity and Access Management
    Day 3
    • Securing AWS Infrastructure Services
    • Securing AWS Container Services
    • Securing AWS Abstracted Services
    • Using AWS Security Services
    Day 4
    • Data Protection in the AWS Cloud
    • Managing security in a hybrid environment
    • Deep dive into AWS monitoring and log analysis
    • Protecting against outside threats to AWS VPC
    Day 5
    • How to carry out a Pentest on an AWS solution
    • Security Incident Management and Automating security and incident response
    • Threat detection and monitoring sensitive data
    • Lets Do it! Building Compliant Workloads on AWS—Case Study

     

     

    Course Overview:

    CT-225: Network+ is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client. The course also helps to prepare students for three popular certification examinations: CompTIA Network+, Microsoft Networking Essentials, and Novell Networking Technologies.

    Attendees to CT-225: Network+ will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    08/25/2025 - 08/29/2025
    08:00 -16:00
    CT-225: Network+
    TechNow, Inc, San Antonio TX
    12/15/2025 - 12/19/2025
    08:00 -16:00
    CT-225: Network+
    TechNow, Inc, San Antonio TX

    Duration 5 days

    Course Objectives:

    • Identify basic network theory concepts and major network communications methods
    • Describe bounded network media
    • Describe unbounded network media
    • Identify the major types of network implementations
    • Identify TCP/IP addressing and data delivery methods
    • Analyze routing and switching technologies
    • Identify the components of a TCP/IP implementation
    • Analyze network security
    • Implement network security
    • Identify the components of a WAN implementation
    • Identify the components used in cloud computing and virtualization
    • Identify the components of a remote network implementation
    • Manage networks
    • Troubleshoot network issues

    Prerequisites:

    Comments

    Latest comments from students


    User: hanbri9

    Instructor comments: Great instructor.

    Facilities comments: BEST HOTEL!!!!!!! AMAZING LOCATION, GOOD FOOD, NICE SPACE. The location of the hotel is what is almost the best about it. Driving up hwy 10 in the morning is absolutely awful.



     

    Like the class?  Then let everyone know!