- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Plan and implement an IPv4 network
- Implement Dynamic Host Configuration Protocol (DHCP)
- Implement IPv6
- Implement Domain Name System (DNS)
- Implement and manage IP address management (IPAM)
- Plan for remote access
- Implement DirectAccess
- Implement virtual private networks (VPNs)
- Implement networking for branch offices
- Configure advanced networking features
- Implement Software Defined Networking
Prerequisites:
- A basic understanding of networking fundamentals
- Experience working with Windows Server 2008 or Windows Server 2012
- Experience working in a Windows Server infrastructure enterprise environment
- Knowledge of the Open Systems Interconnection (OSI) model
- Understanding of core networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking
- Basic knowledge of the TCP/IP protocol stack, addressing and name resolution
- Experience with and knowledge of Hyper-V and virtualization
- Hands-on experience working with the Windows client operating systems such as Windows 8.1 or Windows 10
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!
Course Overview:
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:
Date/Time | Event |
---|---|
10/06/2025 - 10/10/2025 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- The IS Audit Process (10%)
- Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
- IT Governance (15%)
- Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
- System and Infrastructure Life Cycle Management (16%)
- Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
- IT Service Delivery and Support (14%)
- Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
- Protection of Information Assets (31%)
- Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
- Business Continuity and Disaster Recovery (14%)
- Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.