Course Overview:

This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.

Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
01/05/2026 - 01/09/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX
04/06/2026 - 04/10/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX
07/27/2026 - 07/31/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX
10/19/2026 - 10/23/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX

Course Duration: 5 days

Course Objectives:

  • Prepare to deploy cloud solutions
  • Deploy a pilot project
  • Test a pilot project deployment
  • Design a secure network for cloud deployment
  • Determine CPU and memory sizing for cloud deployments
  • Plan Identity and Access Management for cloud deployments
  • Analyze workload characteristics to ensure successful migration to the cloud
  • Secure systems to meet access requirements
  • Maintain cloud systems
  • Implement backup, restore, and business continuity measures
  • Analyze cloud systems for required performance
  • Analyze cloud systems for anomalies and growth forecasting
  • Troubleshoot deployment, capacity, automation, and orchestration issues
  • Troubleshoot connectivity issues
  • Troubleshoot security issues

Course Prerequisites:

  • Security+, Network+, CASP or equivalent experience
  • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 12/08/2025 – 12/11/2025
    • San Antonio
  • CT-425: CompTIA Advanced Security Practitioner (CASP+)
    • 12/08/2025 – 12/12/2025
    • San Antonio
  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • in   

    TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

    Here are courses about specilaized Software or Hardware:

    in   

    Course Overview:

    As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications.  In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP.   Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.  Other protocols such as Nortel's UNIStim will be addressed.  As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures.   Various open source tools including those in BackTrack are used for VoIP attacks.  A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.

    Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • VoIP Architecture
    • VoIP Signaling and media protocols
    • Common VoIP authentication mechanisms
    • Common VoIP encryption techniques
    • VoIP protocol analysis with Wireshark
    • Maintaining QoS while mitigating DoS
    • VoXML, XML, and application integration security
    • Converged network security design and implementation
    • Impact of NAT and firewalls
    • SIP, H.323, and MGCP vulnerabilities
    • VPN, IPsec and SRTP to secure VoIP services
    • Penetration testing with open source tools
    • Attacks for Eavesdropping, call redirection, and DoS
    • Design of hacked firmware virtualization layer
    • Concise lockdown steps for network hardware and VoIP

    Prerequisites:

    • This is an advanced Information Security Course which requires basic Windows & UNIX competency
    • Certification or 2 years of experience in these operating systems is highly recommended
    • As well as an understanding of TCP/IP

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

    After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Outline:

    • Identity and access
      • Configure Azure Active Directory for Azure workloads and subscriptions
      • Configure Azure AD Privileged Identity Management
      • Configure security for an Azure subscription
    • Platform Protection
      • Understand cloud security
      • Build a network
      • Secure network
      • Implement host security
      • Implement platform security
      • Implement subscription security
    • Security Operations
      • Configure security services
      • Configure security policies by using Azure Security Center
      • Manage security alerts
      • Respond to and remediate security issues
      • Create security baselines
    • Data and Applications
      • Configure security policies to manage data
      • Configure security for data infrastructure
      • Configure encryption for data at rest
      • Understand application security
      • Implement security for application lifecycle
      • Secure applications
      • Configure and manage Azure Key Vault

    Prerequisites :

        • AZ-900: Microsoft Azure Fundamentals
        • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
        • Student must be able to program in an Azure Supported Language.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!