Here are the Information Privacy Protection course offerings:
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.
Course Overview:
This course is a project management certification that provides validation of fundamental project management skills. This course will confirm a project manager’s knowledge of the project life cycle, from initiation and planning, through execution, acceptance, support and closure. Students will gain the knowledge and skills necessary to complete projects on time and within budget, and learn common project management terminology used throughout the industry.
Attendees to CT-210: Project+ will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/17/2026 - 02/20/2026 08:00 -16:00 |
CT-210: Project+ TechNow, Inc, San Antonio TX |
|
05/18/2026 - 05/21/2026 08:00 -16:00 |
CT-210: Project+ TechNow, Inc, San Antonio TX |
|
07/20/2026 - 07/23/2026 08:00 -16:00 |
CT-210: Project+ TechNow, Inc, San Antonio TX |
|
10/13/2026 - 10/16/2026 08:00 -16:00 |
CT-210: Project+ TechNow, Inc, San Antonio TX |
|
12/14/2026 - 12/17/2026 08:00 -16:00 |
CT-210: Project+ TechNow, Inc, San Antonio TX |
Duration: 4 Days
Course Objectives:
- Project Initiation
- Project planning, estimating and scheduling.
- Creating project plans
- Managing people
- Managing cost and evaluating project performance
- Project closure
Prerequisites:
- Basic understanding of project management
Comments
Latest comments from students
User: ChiefsLeo94
Instructor comments: Mr. Moore was very knowledgeable in the subject area and kept us on target and interested in subject area by inputting relevant stories from his project management experience.
Facilities comments: Room was adequate for the training environment just big enough for the class size and still not feel like a broom closet.
User: trosale8
Instructor comments: very knowledgeable and very supportive and empathetic. Taught us not only the content but the test-taking techniques. Instructor talks during lab/practice tests which is harder to concentrate.
Liked the class? Then let everyone know!
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.
Liked the class? Then let everyone know!
The Microsoft platform is arguably the largest component in any IT architecture, and rate of change in this arena makes training in the Microsoft platform a must. TechNow can and does teach the entire gamut of Microsoft technologies, from Servers to application development.
Here is a list of all of our Microsoft courses:
- AZ-204: Developing Solutions for Microsoft Azure
- AZ-400: Microsoft Azure DevOps Solutions
- AZ-500: Microsoft Azure Security Technologies
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
- DP-201: Designing an Azure Data Solution
- MS-10174: Configuring and Administering SharePoint 2010 and 2013
- MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010 & 2013
- MS-10231: Designing a Microsoft SharePoint 2010 and 2013 Infrastructure
- MS-2124: Programming with C#
- MS-5002: Introduction to SQL Databases
- MS-6231: Maintaining a Microsoft SQL Server Database
- MS-6232: Implementing a Microsoft SQL Server Database
- TN-323: SharePoint 2010 and 2013 for Project Management
- TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
- TN-5202: Microsoft SharePoint 2010 and 2013: Workflows and Designing InfoPath Forms
- TN-5305: Supporting and Troubleshooting Windows 11
- TN-5315: Configuring Windows Devices
- TN-5320: Microsoft Modern Desktop Administrator
- TN-5415: Installation, Storage, and Compute with Windows Server 2016
- TN-5425: Networking with Windows Server 2016
- TN-5455: Managing Windows Environments with Group Policy
- TN-765: Automating Administration with Windows Powershell
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell