Course Overview:

CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.  Cloud Essentials is a vendor-neutral credential designed to validate the candidate has an understanding of basic terms and definitions of cloud computing along with the different processes involved in the successful adoption of cloud computing and its implications for organizations’ use.

TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ curriculum.

Attendees to CT-213: Cloud Essentials+ will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
03/30/2026 - 04/01/2026
08:00 -16:00
CT-213: Cloud Essentials+
TechNow, Inc, San Antonio TX
06/15/2026 - 06/17/2026
08:00 -16:00
CT-213: Cloud Essentials+
TechNow, Inc, San Antonio TX
10/13/2026 - 10/15/2026
08:00 -16:00
CT-213: Cloud Essentials+
TechNow, Inc, San Antonio TX

Course Duration: 3 days

Course Objectives:

  • Domain 1 : Cloud Concepts
    • Understand cloud principles
    • Identify cloud networking concepts & storage techniques
    • Understand cloud design aspects
  • Domain 2: Business Principles of Cloud Environments
    • Identify and employ appropriate cloud assessments like feasibility studies, benchmarking, or gap analysis
    • Highlight key business aspects of cloud vendor relation adoption, and comprehend cloud migration approaches
  • Domain 3: Management and Technical Operations
    • Explain aspects of operating within the cloud, such as data management or optimization
    • Understand the role of DevOps in cloud environments, like API integration or provisioning
  • Domain 4: Governance, Risk, Compliance and Security for the Cloud
    • Understand risk management and response concepts related to cloud services and identify the importance and impacts of compliance in the cloud, such as regulatory concerns or international standards.

 

Course Prerequisites:

  • CompTIA recommends that a candidate have at least 6 months of experience in an IT environment, with direct involvement in IT-related tasks responsibilities and/or decision making.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

TechNow, Inc., a training company, was founded in 1990.  TechNow celebrates 35 years of regularly scheduled commercial training delivery in 2025 and has evolved into a global training company that is dynamic and able to customize our training to meet the needs of our customers.  Our focus is hands-on, skills-based hardware/software and security training for those who want stay current with today’s ever-changing technologies.  We are a Pearson Vue Testing Center and have developed a proven testing program, including mobile testing, that ends with certification at the end of many of our courses.  Our courses are taught by professional educators and experts in their respective fields and bring to the classroom a wealth of knowledge from the “real world”.  Our customers include many Fortune 500 companies as well as the Department of Defense, Federal Government, and Intelligence Agencies.

At TechNow our goal is to help you achieve your goals and we strive for 100% customer service and satisfaction.  TechNow‘s certification pass rate is the highest in the industry.  Our web-site and our professional training advisors will assist you with selecting courses that help meet your organization’s objectives and the right career path to stay competitive in today’s market.

To learn more about TechNow or to schedule your training, call us at 800-324-2294.

in   

CCFE Core Competencies

  • Procedures and Legal Issues
  • Computer Fundamentals
  • Partitioning Schemes
  • Data Recovery
  • Windows File Systems
  • Windows Artifacts
  • Report writing (Presentation of Finding)
  • Procedures and Legal issues
  1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
  2. Ability to explain the on-scene action taken for evidence preservation.
  3. Ability to maintain and document an environment consolidating the computer forensics.
  • Computer Fundamentals
  1. Understand BIOS
  2. Computer hardware
  3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
  4. Knowledge of sectors, clusters, files.
  5. Understanding of logical and physical files.
  6. Understanding of logical and physical drives.
  • Partitioning schemes
  1. Identification of current partitioning schemes.
  2. Understanding of primary and extended partition.
  3. Knowledge of partitioning schemes and structures and system used by it.
  4. Knowledge of GUID and its application.
  • Windows file system
  1. Understanding of concepts of files.
  2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
  3. Identification, examination, analyzation of NTFS master file table.
  4. Understanding of $MFT structure and how they store data.
  5. Understanding of Standard information, Filename, and data attributes.
  • Data Recovery
  1. Ability to validate forensic hardware, software, examination procedures.
  2. Email headers understanding.
  3. Ability to generate and validate forensically sterile media.
  4. Ability to generate and validate a forensic image of media.
  5. Understand hashing and hash sets.
  6. Understand file headers.
  7. Ability to extract file metadata from common file types.
  8. Understanding of file fragmentation.
  9. Ability to extract component files from compound files.
  10. Knowledge of encrypted files and strategies for recovery.
  11. Knowledge of Internet browser artifacts.
  12. Knowledge of search strategies for examining electronic
  • Windows Artifacts
  1. Understanding the purpose and structure of component files that create the windows registry.
  2. Identify and capability to extract the relevant data from the dead registry.
  3. Understand the importance of restore points and volume shadow copy services.
  4. Knowledge of the locations of common Windows artifacts.
  5. Ability to analyze recycle bin.
  6. Ability to analyze link files.
  7. Analyzing of logs
  8. Extract and view windows logs
  9. Ability to locate, mount and examine VHD files.
  10. Understand the Windows swap and hibernation files.
  • Report Writing (Presentation of findings)
  1. Ability to conclude things strongly based on examination observations.
  2. Able to report findings using industry standard technically accurate terminologies.
  3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
  4. Be able to consider legal boundaries when undertaking a forensic examination

Course Overview:

Intrusion Analyst is a hands-on course that covers intrusion detection in-depth. This includes concepts such as the use of Snort, network traffic analysis, and IDS signatures.

A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of packet and intrusion analysis.

Attendees to TN-979: Intrusion Analyst will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Advanced Snort Concepts
  • Analyst Toolkit
  • Domain Name System (DNS)
  • Examining Packet Crafting
  • Examining Packet Header Fields
  • Fragmentation
  • ICMP Theory
  • IDS Interoperability
  • IDS Patterns
  • IDS/IPS Management & Architecture Issues
  • Indications, Warnings & Traffic Correlation
  • IPv6
  • Microsoft Protocols
  • Network Traffic Analysis
  • NIDS Evasion, Instertion & Checksums
  • Snort Fundamentals & Configuration
  • Snort GUIs & Sensor Management
  • Snort Performance, Active Response & Tagging
  • Snort Rules
  • Stimulus Response
  • TCPdump Fundamentals
  • TCP/IP Fundamentals
  • Wireshark Fundamentals
  • Writing TCPdump Filters

Course Prerequisites:

  • GSEC or equivalent experience
  • UNIX, Windows, Networking, and Security Experience
  • This is a hands-on skill course requiring comfort with command line interaction and network communications

Comments

Latest comments from students


User: Tosha

Instructor comments: Dave was an excellent instructor. He is very informative and knowledgeable in the course and the material. I have enjoyed the class and I would take another course with him as the instructor.

Facilities comments: Very nice and clean hotel.


User: buckey26

Instructor comments: Dave was one of the best instructors I have ever had for a tech course. He broke down everything to the point where you can understand it internally.


Liked the class?  Then let everyone know!

Course Overview:

This course is designed for students who intend to work with virtual private networks (VPNs) using IPSec. The course includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. This class is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients.

Attendees to N-315: Cisco Secure Virtual Private Networks will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Network Security & Virtual Private Network Technologies Cisco VPN 3000 Concentrator Series Hardware Overview
  • Routing on the VPN 3000
  • Configuring the Cisco VPN 3000 for Remote Access Using Pre-shared Keys
  • Configuring the Cisco VPN 3000 for Remote Access Using Digital Certificates
  • The Cisco VPN Client Firewall Feature
  • Configuring the Cisco 3002 Hardware Client for Remote Access
  • Configuring the Cisco 3002 Hardware Client for User & Unit Authentication
  • Configuring Cisco VPN Clients for Backup Server, Load Balancing & Reverse Route Injection
  • Configuring the Cisco 3000 Concentrator for IPSec over TCP & UDP
  • Configuring LAN-to-LAN VPNs on the Cisco 3000
  • Network Monitoring & Administration Troubleshooting

Prerequisites:

  • Students who attend this advanced course must have experience in configuring Cisco IOS software
  • CCNA certification
  • Basic knowledge of the Windows operations system
  • Familiarity with the networking & security terms & concepts

Comments

Latest comments from students


Liked the class?  Then let everyone know!