Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in   
     

    Course Overview:

    Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

    What’s Included:

    • Authorized courseware
    • Exam voucher
    • IAPP membership

    **GDPR Regulation Mandated May 25, 2018**

    Course Objectives:

    Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.

    Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

    TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

    TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 2 Days

    Course Content:

    • Module 1: Introduction to Privacy Program Management
    • Module 2: Privacy Governance
    • Module 3: Applicable Laws and Regulations
    • Module 4: Data Assessments
    • Module 5: Policies
    • Module 6: Data Subjects’ Rights
    • Module 7: Training and Awareness
    • Module 8: Protecting Personal Information
    • Module 9: Data Breach Incident Plans
    • Module 10: Measuring, Monitoring and Auditing Program Performance

     

    Prerequisites: None

    Target Audience:

    Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it.  The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession.  With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.  CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.  This course will help the student prepare to obtain this credential.

    Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    10/06/2025 - 10/10/2025
    08:00 -16:00
    TN-822: Certified Information Systems Auditor (CISA) Seminar
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • The IS Audit Process (10%)
      • Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
    • IT Governance (15%)
      • Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
    • System and Infrastructure Life Cycle Management (16%)
      • Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
    • IT Service Delivery and Support (14%)
      • Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
    • Protection of Information Assets (31%)
      • Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
    • Business Continuity and Disaster Recovery (14%)
      • Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

    Prerequisites:

    A minimum of five years of professional information systems auditing, control & security work experienced is required.  Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.

    Comments

    Latest comments from students


    User: fsarisen

    Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


    User: storoy30

    Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


    Liked the class?  Then let everyone Know!

      

     

    Course Overview: PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Class is a three-day course that teaches students to configure and manage the entire line of Palo Alto Networks next-generation firewalls. This course prepares the student for the Palo Alto Networks Accredited Configuration Engineer (ACE) and progress to the Palo Alto Networks Certified Network Security Engineer (PCNSE).  Through hands-on training, students learn high end skills of how to integrate Palo Alto next-generation firewalls into their network infrastructure.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

    This course sets up the foundation for the two day course PA-212: Palo Alto Networks Firewall Configure Extended Features. The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201) Training Course will receive TechNow approved course materials and expert instruction.

    TechNow PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205) immediately follows this course in the schedule so that you can take both courses in the same week.  We also offer a discount for attending both classes in the same week!!

    Dates/Locations:

    No Events

    Duration: 3 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS).

    Day 1

    • Module 0 – Introduction & Overview
    • Module 1 – Platforms and Architecture
      • Single-Pass Architecture
      • Flow Logic
    • Module 2 – Initial Configuration
      • Initial Access to the System
      • Configuration Management
      • Licensing and Software Updates
      • Account Administration
    • Mod 3: Basic Interface Configuration
      • Security Zones
        Layer 2, Layer 3, Virtual Wire, and Tap
      • Subinterfaces
      • DHCP
      • Virtual Routers
    • Mod 4: Security and NAT Policies
      • Security Policy Configuration
      • Policy Administration
      • NAT (source and destination)

    Day 2

    • Mod 5: Basic App-ID™
      • App-ID Overview
      • Application Groups and Filters
    • Mod 6: Basic Content-ID™
      • Antivirus
      • Anti-spyware
      • Vulnerability
      • URL Filtering
    • Mod 7: File Blocking and WildFire™
      • File Blocking
      • WildFire
    • Mod 8: Decryption
      • Certificate Management
      • Outbound SSL Decryption
      • Inbound SSL Decryption

         

         

    Day 3

    • Mod 9: Basic User-ID™
      • Enumerating Users
      • Mapping Users to IP Addresses
      • User-ID Agent
    • Mod 10: Site-to-Site VPNs
      • IPSec Tunnels
    • Mod 11: Management and Reporting
      • Dashboard
      • Basic Logging
      • Basic Reports
      • Panorama
    • Mod 12: Active/Passive High
      • Availability
      • Configuring Active/Passive HA

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!

    Course Overview:

    A skills focus enables the student to better absorb the subject matter and perform successfully on the exam.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.

    Attendees to TN-939:  Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 9 days

    Course Objectives:

    • Backdoors & Trojan Horses
    • Buffer Overflows
    • Covering Tracks: Networks
    • Covering Tracks: Systems
    • Denial of Service Attacks
    • Exploiting Systems Using Netcat
    • Format String Attacks
    • Incident Handling Overview and Preparation
    • Incident Handling Phase 2: Identification
    • Incident Handling Phase 3: Containment
    • Incident Handling: Recovering and Improving Capabilities
    • IP Address Spoofing
    • Network Sniffing
    • Password Attacks
    • Reconnaissance
    • Rootkits
    • Scanning: Host Discovery
    • Scanning: Network and Application Vulnerability scanning and tools
    • Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
    • Scanning: Service Discovery
    • Session Hijacking, Tools and Defenses
    • Types of Incidents
    • Virtual Machine Attacks
    • Web Application Attacks
    • Worms, Bots & Bot-Nets

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: m_jurrens

    Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.


    User: natebonds

    Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.

    Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.


    Liked the class?  Then let everyone know!