Here are the General Unix course offerings:
Course Overview:
This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.
This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
You will learn how to protect, detect and respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council iLabs access included for 6 months
- EC-Council official Certificate of Attendance
- CND Exam Voucher with 1 FREE RETAKE VOUCHER
Dates/Locations:
| Date/Time | Event |
|---|---|
|
04/27/2026 - 05/01/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
|
07/20/2026 - 07/24/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
|
10/26/2026 - 10/30/2026 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Network and Defense Strategies
- Module 02. Administrative Network Security
- Module 03. Technical Network Security
- Module 04. Network Perimeter Security
- Module 05. Endpoint Security-Windows Systems
- Module 06. Endpoint Security- Linux Systems
- Module 07. Endpoint Security- Mobile Devices
- Module 08. Endpoint Security- IoT Devices
- Module 09. Administrative Application Security
- Module 10. Data Security
- Module 11. Enterprise Virtual Network Security
- Module 12. Enterprise Cloud Network Security
- Module 13. Enterprise Wireless Network Security
- Module 14. Network Traffic Monitoring and Analysis
- Module 15. Network Logs Monitoring and Analysis
- Module 16. Incident Response and Forensic Investigation
- Module 17. Business Continuity and Disaster Recovery
- Module 18. Risk Anticipation with Risk Management
- Module 19. Threat Assessment with Attack Surface Analysis
- Module 20. Threat Prediction with Cyber Threat Intelligence
Prerequisites:
- Basic network and host operations knowledge
- Experience commensurate with one to five years of network, host, or application administration
- TN-325:Security+ or equivalent
Courses to follow:
- TN-555: Certified Ethical Hacker v10 (CEH)
- TN-575: Open Source Network Security Monitoring
- TN-979: Intrusion Analyst Course
Target Audience:
Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course teaches students how to use the powerful PERL programming language, focusing on hands-on labs to promote retention & challenge students to apply their skills to new situations. PERL is a flexible, easy to use language suitable for many tasks such as system administration, web applications & database integration. System administrators, web programmers & database administrators will benefit from mastering this powerful programming language. This course reviews & builds on the information presented in PL-115: Fundamentals of Computer Programming.
Attendees to P-245: Programming with PERL will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Course Duration: 5 days
Course Objectives:
- Introduction
- Scalar Data
- Lists & Arrays
- Subroutines
- Input & Output
- Hashes
- In the World of Regular Expressions
- Matching with Regular Expressions
- Processing Text with Regular Expressions
- More Control Structures
- File Tests
- Directory Operations
- Strings & Sorting
- Process Management
- PERL Modules
- Some Advanced PERL Techniques
Prerequisites:
- Knowledge or experience in shell, C or another programming language is a great indicator of readiness
- Students who have never programmed before should take PL-115: Fundamentals of Computer Programming before taking this class
- Students looking to master PERL programming skills will greatly benefit from this course as well as P-315: Intermediate PERL Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
Attendees to TN-765: Automating Administration with Windows Powershell will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Describe the functionality of Windows PowerShell and use it to run and find basic commands
- Identify and run cmdlets for server administration
- Work with Windows PowerShell pipeline
- Describe the techniques Windows PowerShell pipeline uses
- Use PSProviders and PSDrives to work with other forms of storage
- Query system information by using WMI and CIM
- Work with variables, arrays, and hash tables
- Write basic scripts in Windows PowerShell
- Write advanced scripts in Windows PowerShell
- Administer remote computers
- Use background jobs and scheduled jobs
- Use advanced Windows PowerShell techniques
Course Prerequisites:
- Experience with Windows networking technologies and implementation.
- Experience with Windows Server administration, maintenance, and troubleshooting.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- VoIP Architecture
- VoIP Signaling and media protocols
- Common VoIP authentication mechanisms
- Common VoIP encryption techniques
- VoIP protocol analysis with Wireshark
- Maintaining QoS while mitigating DoS
- VoXML, XML, and application integration security
- Converged network security design and implementation
- Impact of NAT and firewalls
- SIP, H.323, and MGCP vulnerabilities
- VPN, IPsec and SRTP to secure VoIP services
- Penetration testing with open source tools
- Attacks for Eavesdropping, call redirection, and DoS
- Design of hacked firmware virtualization layer
- Concise lockdown steps for network hardware and VoIP
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- As well as an understanding of TCP/IP
Comments
Latest comments from students