Here are the General Unix course offerings:
Course Overview:
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.
Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.

Dates/Locations:
Duration: 5 Days
Course Objectives:
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
Prerequisites:
- CCNA certification
- Implementation of Enterprise LAN networks
- Basic understanding of Enterprise routing and wireless connectivity
- Basic understanding of Python scripting
Comments
Latest comments from students
User: don.seguin
Instructor comments: Tim was a great.
Facilities comments: The classroom was great.
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Great
Liked the class? Then let everyone know!
Course Overview:
This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.
This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
You will learn how to protect, detect and respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

What’s Included:
- EC-Council official E-Courseware
- EC-Council iLabs access included for 6 months
- EC-Council official Certificate of Attendance
- CND Exam Voucher with 1 FREE RETAKE VOUCHER
Dates/Locations:
Date/Time | Event |
---|---|
09/15/2025 - 09/19/2025 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Network and Defense Strategies
- Module 02. Administrative Network Security
- Module 03. Technical Network Security
- Module 04. Network Perimeter Security
- Module 05. Endpoint Security-Windows Systems
- Module 06. Endpoint Security- Linux Systems
- Module 07. Endpoint Security- Mobile Devices
- Module 08. Endpoint Security- IoT Devices
- Module 09. Administrative Application Security
- Module 10. Data Security
- Module 11. Enterprise Virtual Network Security
- Module 12. Enterprise Cloud Network Security
- Module 13. Enterprise Wireless Network Security
- Module 14. Network Traffic Monitoring and Analysis
- Module 15. Network Logs Monitoring and Analysis
- Module 16. Incident Response and Forensic Investigation
- Module 17. Business Continuity and Disaster Recovery
- Module 18. Risk Anticipation with Risk Management
- Module 19. Threat Assessment with Attack Surface Analysis
- Module 20. Threat Prediction with Cyber Threat Intelligence
Prerequisites:
- Basic network and host operations knowledge
- Experience commensurate with one to five years of network, host, or application administration
- TN-325:Security+ or equivalent
Courses to follow:
- TN-555: Certified Ethical Hacker v10 (CEH)
- TN-575: Open Source Network Security Monitoring
- TN-979: Intrusion Analyst Course
Target Audience:
Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.
Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
http://technow.www162-254-253-232.a2hosted.com/palo-alto-firewall-essentials-fasttrack-training-class-course-pa-215/
Course Overview:
PA-215: Palo Alto Networks Firewall Essentials FastTrack Training Class is a five-day course that teaches students to configure and manage the entire line of Palo Alto Networks next-generation firewalls. Through hands-on training, students learn high end skills of how to integrate Palo Alto next-generation firewalls into their network infrastructure.This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
This course sets up the foundation for the two day course PA-222: Palo Alto Networks Panorama Essentials.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, Cisco, Unix, and Windows certifications.
Attendees to the PA-215: Palo Alto Firewall Essentials FastTrack Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration 5 days
Course Objectives:
Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS).
|
|
|
|
|
Prerequisites:
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class? Then let everyone know!
Course Overview:
TechNow’s CCSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Cloud Security Professional exam. The exam covers (ISC)²’s 6 Domains from the Common Body of Knowledge, which encompass the whole of cloud security.
This course is an intense 5 day program. TechNow has a proven training and certification track record that you can depend on. CCSP test is 125 questions that typically require more comprehension than CISSP questions. The instructor takes time to walk through scenarios that assume comprehensive knowledge of enterprise infrastructures.
Attendees to CL-315: CCSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.
The 6 domains of the CCSP CBK:
- Architectural Concepts & Design Requirements
- Cloud Data Security
- Cloud Platform & Infrastructure Security
- Cloud Application Security
- Operations
- Legal & Compliance
Duration: 5 days
Audience: Mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing. CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.
DoD 8140: Not Mandated
Course Prerequisites: IT professional with 5 years of experience, 3 years of security experience, and at least 1 year of cloud security experience. GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures. CCSP test is 125 questions that typically require more comprehension than CISSP questions. This course is for those who are already qualified at the enterprise level for IT infrastructures, have Cloud experience, and are looking for a Cloud Security certification.
Course Objectives:
Domain 1: Architectural Concepts and Design Requirements
- Module 1: Understand cloud computing concepts
- Module 2: Describe cloud reference architecture
- Module 3: Understand security concepts relevant to cloud computing
- Module 4: Understand design principles of secure cloud computing
- Module 5: Identify trusted cloud services
Domain 2: Cloud Data Security
- Module 1: Understand Cloud Data Life Cycle
- Module 2: Design and Implement Cloud Data Storage Architectures
- Module 3: Understand and implement Data Discovery and Classification Technologies
- Module 4: Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
- Module 5: Design and implement Data Rights Management
- Module 6: Plan and Implement Data Retention, Deletion, and Archival policies
- Module 7: Design and Implement Auditability, Traceability, and Accountability of Data Events
Domain 3: Cloud Platform Infrastructure Security
- Module 1: Comprehend Cloud Infrastructure Comp
- Module 2: Analyze Risks Associated to Cloud Infrastructure
- Module 3: Design and Plan Security Controls
- Module 4: Plans Disaster Recovery & Business Continuity Management
Domain 4: Cloud Application Security
- Module 1: Recognize Need for Training and Awareness in Application Security
- Module 2: Understand Cloud Software Assurance and Validation
- Module 3: Use Verified Secure Software
- Module 4: Comprehend the Software Development Life Cycle (SDLC) Process
- Module 5: Apply the Secure Software Development Life Cycle
- Module 6: Comprehend the Specifics of Cloud Application Architecture
- Module 7: Design Appropriate Identity and Access Management (IAM) Solutions
Domain 5: Operations
- Module 1: Support the Planning Process for the Data Center Design
- Module 2: Implement and Build Physical Infrastructure for Cloud Environment
- Module 3: Run Physical Infrastructure for Cloud Environment
- Module 4: Manage Physical Infrastructure for Cloud Environment
- Module 5: Build Logical Infrastructure for Cloud Environment
- Module 6: Run Logical Infrastructure for Cloud Environment
- Module 7: Manage Logical Infrastructure for Cloud Environment
- Module 8: Ensure Compliance with Regulations and Controls
- Module 9: Conduct Risk Assessment to Logical and Physical Infrastructure
- Module 10: Understand the Collection and Preservation of Digital Evidence
- Module 11: Manage Communications with Relevant Parties
Domain 6: Legal and Compliance
- Module 1: Understand Legal Requirements and Unique Risks Within the Cloud Environment
- Module 2: Understand Privacy Issues, Including Jurisdictional Variances
- Module 3: Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
- Module 4: Understand Implication of Cloud to Enterprise Risk Management
- Module 5: Understand Outsourcing and Cloud Contract Design
- Module 6: Execute Vendor Management
Dates/Locations: