Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam from EC-Council.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council official iLabs code with access for 6 months
- EC-Council official Certificate of Attendance
- CEH Exam Voucher
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/23/2026 - 02/27/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
06/01/2026 - 06/05/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
08/24/2026 - 08/28/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
11/30/2026 - 12/04/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Introduction to Ethical Hacking
- Module 02. Foot-printing and Reconnaissance
- Module 03. Scanning Networks
- Module 04. Enumeration
- Module 05. Vulnerable Analysis
- Module 06. System Hacking
- Module 07. Malware Threats
- Module 08. Sniffing
- Module 09. Social Engineering
- Module 10. Denial-of-Service
- Module 11. Session Hijacking
- Module 12. Evading IDS,Firewalls, and Honeypots
- Module 13. Hacking Web Servers
- Module 14. Hacking Web Applications
- Module 15. SQL Injection
- Module 16. Hacking Wireless Networks
- Module 17. Hacking Mobile Platforms
- Module 18. IoT and OT Hacking
- Module 19. Cloud Computing
- Module 20. Cryptography
Prerequisites:
- Windows operating system and/or Linux operating system or other Unix-based OS
- TCP/IP protocols and implementation
- At least 2 years of IT security experience
- TN-325:Security+
Target Audience:
Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The RHCSA Rapid Track Course is designed for experienced Linux® system administrators who want to expand their technical skill sets and become accredited with the Red Hat® Certified System Administration (RHCSA) certification. To successfully navigate this course, students should have experience with the Linux command line—including the necessary skills to execute common commands, such as cp, grep, sort, mkdir, tar, mkfs, ssh, and dnf—and be familiar with accessing man pages for help. At the completion of the course, students will be adequately prepared to take the RHCSA exam (EX200) .
Date/Locations:
Duration: 5 days
Course Objectives:
- Introduce Linux and the Red Hat Enterprise Linux ecosystem.
- Run commands and view shell environments.
- Manage, organize, and secure files.
- Manage users, groups and user security policies.
- Control and monitor systemd services.
- Configure remote access using the web console and SSH.
- Configure network interfaces and settings.
- Manage software using DNF
- Access security files, file systems, and networks
- Execute shell scripting and automation techniques
- Manage storage devices, logical volumes, and file systems
- Manage security and system access
- Control the boot process and system services
- Running containers
Prerequisites:
Experience in the field system administration.
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:
- TN-345: Python for Penetration Testers
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-909: Windows Forensic Analysis
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course