Further Information about TechNow, Location, and how to contact us.
Security Course Flow
Here is our list of security related courses.
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar
- CL-415: AWS System Operations
- CL-425: AWS Security Operations and Architecture
- CT-325: Security+
- CT-395: CySA+ Cybersecurity Analyst
- CT-405: PenTest+
- CT-425: CompTIA SecurityX
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- N-595: VoIP Security Analysis and Design
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
- PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance
- PP-244:CIPM + CIPP/E 4 Day GDPR Ready
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-385: TCP/IP Analysis & Implementation
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-525: Certified Penetration Testing Professional (CPENT)
- TN-535: Certified Forensic Computer Examiner (CFCE)
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-555: Certified Ethical Hacker v13 (CEH)
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-715: Systems Security Certified Practitioner (SSCP)
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-812: Information Systems Security Engineering Professional (ISSEP)
- TN-813: Certified in Governance, Risk and Compliance (CGRC)
- TN-8150: CISSP Certification Preparation Seminar
- TN-8155: HCISPP Preparation Seminar
- TN-822: Certified Information Systems Auditor (CISA) Seminar
- TN-825: Certified Information Security Manager (CISM) Seminar
- TN-835: Certified in Risk and Information Systems Control (CRISC) Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-905: Cyber Threat Intelligence Analysis
- TN-909: Windows Forensic Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-963: Windows Security Automation with PowerShell
- TN-965 Windows Security Automation with Powershell
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/23/2026 - 03/27/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
06/29/2026 - 07/03/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
09/28/2026 - 10/02/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
-
-
- 2+ years of proven information security work experience
- Educational background with digital security specialization
Target Audience:
-
- Law Enforcement
- Defense & Military
- E-Business Security
- Systems Administrators
- Legal Professionals
- Banking & Insurance professionals
- Government Agencies
- IT Managers
-
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Here are our Linux course offerings:
- CT-245: Linux+
- L-245: Linux System Administration I
- L-295: Linux System Administration II
- L-395: Accelerated Linux Administration and Utilities
- RH-245: Linux System Administration I
- RH-295: Linux System Administration II
- RH-355: RHCSA Rapid Track Course
- TN-901: Linux for Security Professionals
- TN-959: UNIX Security Administrator Course
Course Overview:
This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.
This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
You will learn how to protect, detect and respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council iLabs access included for 6 months
- EC-Council official Certificate of Attendance
- CND Exam Voucher with 1 FREE RETAKE VOUCHER
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/02/2026 - 02/06/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
|
04/27/2026 - 05/01/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
|
07/20/2026 - 07/24/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
|
10/26/2026 - 10/30/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Network and Defense Strategies
- Module 02. Administrative Network Security
- Module 03. Technical Network Security
- Module 04. Network Perimeter Security
- Module 05. Endpoint Security-Windows Systems
- Module 06. Endpoint Security- Linux Systems
- Module 07. Endpoint Security- Mobile Devices
- Module 08. Endpoint Security- IoT Devices
- Module 09. Administrative Application Security
- Module 10. Data Security
- Module 11. Enterprise Virtual Network Security
- Module 12. Enterprise Cloud Network Security
- Module 13. Enterprise Wireless Network Security
- Module 14. Network Traffic Monitoring and Analysis
- Module 15. Network Logs Monitoring and Analysis
- Module 16. Incident Response and Forensic Investigation
- Module 17. Business Continuity and Disaster Recovery
- Module 18. Risk Anticipation with Risk Management
- Module 19. Threat Assessment with Attack Surface Analysis
- Module 20. Threat Prediction with Cyber Threat Intelligence
Prerequisites:
- Basic network and host operations knowledge
- Experience commensurate with one to five years of network, host, or application administration
- TN-325:Security+ or equivalent
Courses to follow:
- TN-555: Certified Ethical Hacker v10 (CEH)
- TN-575: Open Source Network Security Monitoring
- TN-979: Intrusion Analyst Course
Target Audience:
Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students