Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
This course explores the VMware Infrastructure, which consists of VMware ESX Server & VMware Virtual Center Server. We will look at both the design environments and operational processes of the VMware Infrastructure. This course provides IT architects with the insight needed to tackle tough issues in server virtualization such as virtual machine technologies, storage infrastructure, and designing clustered environments. Extensive hands-on labs provide for a rich student experience.
Attendees to VM-315: VMware Infrastructure: Install, Configure, and Manage will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/16/2026 - 03/20/2026 08:00 -16:00 |
VM-315: VMware Infrastructure: Install, Configure, and Manage TechNow, Inc, San Antonio TX |
|
06/22/2026 - 06/26/2026 08:00 -16:00 |
VM-315: VMware Infrastructure: Install, Configure, and Manage TechNow, Inc, San Antonio TX |
|
09/28/2026 - 10/02/2026 08:00 -16:00 |
VM-315: VMware Infrastructure: Install, Configure, and Manage TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Virtual Infrastructure Overview
- ESX and ESXi Server Installation
- Configuration of Networking, Scalability and Security
- Storage
- Install and Configure vCenter Server and Components
- Creation, Deployment, Management, and Migration of Virtual Machines
- Utilize vCenter Server for Resource Management
- Utilize vCenter Server for Virtual Machine Access Control and User Managment
- Use vCenter Server to increase scalability
- Monitoring Your Environment
- Data & Availability Protection Troubleshooting
-
Use VMware vCenter Update Manager to apply ESXi patches
-
Use vCenter Server to manage vMotion, HA, DRS and data protection.
Prerequisites:
- To ensure your success, system administration experience on Microsoft or Linux operating systems is required.
Comments
Latest comments from students
User: wolfdenise
Instructor comments: The instructor was nice and kept us entertained while providing instruction.
Facilities comments: The facility was nice, clean and easy to get to.
User: asteeves@aol.com
Instructor comments: knowledgeable but can get off subject at times
Facilities comments: good
Like the class? Then let everyone know!
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-204:Developing Solutions for Microsoft Azure will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Outline:
- Creating Azure App Service Web Apps
- Implement Azure functions
- Develop solutions that use blob storage
- Develop solutions that use Cosmos DB storage
- Implement laaS solutions
- Implement user authentication and authorization
- Implement secure cloud solutions
- Implement API Management
- Develop App Service Logic Apps
- Develop event-based solutions
- Develop message-based solutions
- Monitor and optimize Azure solutions
- Integrate caching and content delivery within solutions
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Students should have 1-2 years professional development experience and experience with Microsoft Azure.
- Student must be able to program in an Azure Supported Language.
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
PP-244: CIPM + CIPP/E 4 Day GDPR Ready
Course Overview:
A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.
With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.
The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education.
What’s Included:
- Authorized courseware
- 2 Exam vouchers
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance
Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.
Dates/Locations:
Duration: 4 Days
Course Content:
- See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance
- See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data
Comments
Latest comments from students