- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Over twenty years experience in the area of Solaris, Linux, and Unix ensures that you are benefiting from a very mature and successful Solaris, Linux, and Unix training program. TechNow offers the full suite of Solaris, Linux, and Unix courses utilizing real hardware. This is not virtualized Solaris on Intel processors, or remote connection to a distant system. The student learns to deal with real hardware taking advantage of Sparc T series processors. Solaris 10 and Solaris 11 is taught hands-on with data center skills as the focus. We also offer Solaris 10 migration courses to Solaris 10 or Solaris 11.
The following is a list of our Unix/Linux training courses:
- CT-245: Linux+
- L-245: Linux System Administration I
- L-295: Linux System Administration II
- L-395: Accelerated Linux Administration and Utilities
- RH-245: Linux System Administration I
- RH-295: Linux System Administration II
- RH-305:Red Hat System Administration III: Linux Automation with Ansible
- RH-345: Red Hat JBoss Application Administration I
- RH-355: RHCSA Rapid Track Course
- TN-125: Introduction to UNIX and Linux
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-430: Elasticsearch Engineer (ELK)
- TN-901: Linux for Security Professionals
- TN-959: UNIX Security Administrator Course
Course Overview:
This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to maintaining a database.
Attendees to MS-6231: Maintaining a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Installing and Configuring SQL Server
- Managing Databases and Files
- Disaster Recovery
- Managing Security
- Transferring Data
- Automating Administrative Tasks
- Implementation Replication
- Maintaining High Availability
- Monitoring SQL Server
- Troubleshooting and Performance Tuning
Prerequisites:
- None
Comments
Latest comments from students
User: angelangeles
Instructor comments: Clay was knowledgeable instructor with enough experience to make subject matter relatable to real world usage.
Liked the class? Then let everyone know!
Course Overview:
CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions. Cloud Essentials is a vendor-neutral credential designed to validate the candidate has an understanding of basic terms and definitions of cloud computing along with the different processes involved in the successful adoption of cloud computing and its implications for organizations’ use.
TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ curriculum.
Attendees to CT-213: Cloud Essentials+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
03/30/2026 - 04/01/2026 08:00 -16:00 |
CT-213: Cloud Essentials+ TechNow, Inc, San Antonio TX |
|
06/15/2026 - 06/17/2026 08:00 -16:00 |
CT-213: Cloud Essentials+ TechNow, Inc, San Antonio TX |
|
10/13/2026 - 10/15/2026 08:00 -16:00 |
CT-213: Cloud Essentials+ TechNow, Inc, San Antonio TX |
Course Duration: 3 days
Course Objectives:
- Domain 1 : Cloud Concepts
- Understand cloud principles
- Identify cloud networking concepts & storage techniques
- Understand cloud design aspects
- Domain 2: Business Principles of Cloud Environments
- Identify and employ appropriate cloud assessments like feasibility studies, benchmarking, or gap analysis
- Highlight key business aspects of cloud vendor relation adoption, and comprehend cloud migration approaches
- Domain 3: Management and Technical Operations
- Explain aspects of operating within the cloud, such as data management or optimization
- Understand the role of DevOps in cloud environments, like API integration or provisioning
- Domain 4: Governance, Risk, Compliance and Security for the Cloud
- Understand risk management and response concepts related to cloud services and identify the importance and impacts of compliance in the cloud, such as regulatory concerns or international standards.
Course Prerequisites:
- CompTIA recommends that a candidate have at least 6 months of experience in an IT environment, with direct involvement in IT-related tasks responsibilities and/or decision making.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/23/2026 - 03/27/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
06/29/2026 - 07/03/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
09/28/2026 - 10/02/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
-
-
- 2+ years of proven information security work experience
- Educational background with digital security specialization
Target Audience:
-
- Law Enforcement
- Defense & Military
- E-Business Security
- Systems Administrators
- Legal Professionals
- Banking & Insurance professionals
- Government Agencies
- IT Managers
-
-
Comments
Latest comments from students
Liked the class? Then let everyone know!