Here are the Information Privacy Protection course offerings:
Course Overview:
In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.
Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Planning Routing Services to Requirements
- Implementing an EIGRP-Based Solution
- Implementing a Scalable Multiarea Network
- OSPF-Based Solution
- Implement an IPv4- Based Redistribution Solution
- Implementing Path Control Connection of an Enterprise Network to an ISP Network
Prerequisites:
- None
Comments
Latest comments from students
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Awesome
Liked the class? Then let everyone know!
Course Overview:
This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.
Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
Date/Time | Event |
---|---|
11/03/2025 - 11/07/2025 08:00 -16:00 |
CT-215: Cloud+ TechNow, Inc, San Antonio TX |
Course Duration: 5 days
Course Objectives:
- Prepare to deploy cloud solutions
- Deploy a pilot project
- Test a pilot project deployment
- Design a secure network for cloud deployment
- Determine CPU and memory sizing for cloud deployments
- Plan Identity and Access Management for cloud deployments
- Analyze workload characteristics to ensure successful migration to the cloud
- Secure systems to meet access requirements
- Maintain cloud systems
- Implement backup, restore, and business continuity measures
- Analyze cloud systems for required performance
- Analyze cloud systems for anomalies and growth forecasting
- Troubleshoot deployment, capacity, automation, and orchestration issues
- Troubleshoot connectivity issues
- Troubleshoot security issues
Course Prerequisites:
- Security+, Network+, CASP or equivalent experience
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
Liked the class? Then let everyone know!
DoD 8570 Training in San Antonio, TX.
TechNow has developed a proven training program that brings the skillset to the certification process. TechNow is a mobile testing center that can deliver D0D 8570 training and the certification in one week. Our intergrated DoD 8570 training in San Antonio, TX incorporates hands on skills with testing objectives that produces an incredibly high pass rate. To learn more about our DoD 8570 training program click here

Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.