Security Course Flow
Here is our list of security related courses.
Security Course Flow
Here is our list of security related courses.
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
Course Objectives:
Dates/Locations:
Duration: 5 Days
Course Content:
Prerequisites:
Target Audience:
Latest comments from students
Course Overview:
This intensive hands-on class teaches students to develop customized UNIX™ commands, read & write Bourne, Korn & Bash Shell scripts & automate critical server functions. The course includes extensive lab exercises, including hands-on development & debugging of shell scripts, which will give students the ability to be more efficient and productive in less time. The focus of the course will be the Bash shell.
Attendees to TN-215: Shell Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
Prerequisites:
Latest comments from students
User: hnzarate
Instructor comments: Very knowledgeable.
Facilities comments: This hotel needs better water.
Course Overview:
This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.
This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
You will learn how to protect, detect and respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
Dates/Locations:
Duration: 5 Days
Course Content:
Prerequisites:
Courses to follow:
Target Audience:
Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.
Latest comments from students
Course Overview:
TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment. Security teams wrestle with the impact and liability of Cloud computing on an organization. This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).
Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment. Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy. Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds. Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.
Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 3 days
Course Objectives:
Course Prerequisites:
Latest comments from students
User: reedrobt
Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?
Facilities comments: Home2 location was well-kept and convenient to other services.