Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   

    Course Overview:

    Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC²)®’s seven domains.

    Attendees to TN-715: Systems Security Certified Practitioner (SSCP) will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Access Controls
    • Security Operations and Administration
    • Analysis and Monitoring
    • Cryptography
    • Networks and Telecommunications
    • Malicious Code/Malware
    • Risk, Response, and Recovery

    Prerequisites:

    • One year security experience
    • Some knowledge of the (ISC²)®’s seven domains

    Comments

    Latest comments from students


    User: boyleb15

    Instructor comments: Instructor was very knowledgeable on most items covered during this course. There were some topics he did lack the answer to. Instructor would also get sidetracked easily


    User: keginth

    Instructor comments: he was phenomenal with test prep and knew the book well

    Facilities comments: adequate


    Like the class?  Then let everyone know!

     

    Course Overview:

    The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.  Let us help you prepare for the CompTIA Security+ exam (SY0-701).

    TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.

    Attendees to CT-325: Security+ will receive TechNow approved course materials and TechNow expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    08/18/2025 - 08/22/2025
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    10/27/2025 - 10/31/2025
    08:00 -20:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    12/15/2025 - 12/19/2025
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Compare and contrast attacks
    • Compare and contrast security controls
    • Use security assessment tools
    • Explain basic cryptography concepts
    • Implement a public key infrastructure
    • Implement identity and access management controls
    • Manage access services and accounts
    • Implement a secure network architecture
    • Install and configure security appliances
    • Install and configure wireless and physical access security
    • Deploy secure host, mobile, and embedded systems
    • Implement secure network access protocols
    • Implement secure network applications
    • Explain risk management and disaster recovery concepts
    • Describe secure application development concepts
    • Explain organizational security concepts

    Prerequisites:

    • CompTIA A+ and Network+ certifications, or equivalent knowledge.
    • Windows 7/8/10 and Server 2008/2012/2016 experience required.
    • Six to nine months experience in networking, including experience in configuring & managing TCP/IP.

    Comments

    Latest comments from students


    User: joshjepsen@hotmail.com

    Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.



     

    Liked the class?  Then let everyone know!

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Advanced Hash Manipulation
    • Command Shell vs. Terminal Access
    • Enumerating Users
    • Exploitation Fundamentals
    • Injection Attacks
    • Legal Issues
    • Metasploit
    • Moving Files with Exploits
    • Obtaining and Passing Password Representations
    • Overview of Passwords
    • Penetration Testing Foundations
    • Penetration Testing Process
    • Penetration Testing via the Command Line
    • Profiling the Target
    • Reconnaissance
    • Scanning for Targets
    • Using a Proxy to Attack a Web Application
    • Vulnerability Scanning
    • Wireless Crypto and Client Attacks
    • Wireless Fundamentals

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, networking, and security experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students



    User: kdwagoner

    Instructor comments: Very knowledgeable. Kept class focused and on task

    Facilities comments: Good


    Liked the class?  Then let everyone know!

    TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:

    in