Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-325: Security+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • VM-315: VMware Infrastructure: Install, Configure, and Manage
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-215: Cloud+
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • in   

      After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

      Scroll down to see the course description.

      First Name*

      Last Name*

      Your Email*

      Your Organization*

      Phone*

      Questions:

      After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Windows Security Automation and Threat Hunting with PowerShell Seminar

      Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

      Date: October 10, 2018 8:00am – 4:00pm

      Duration: 8 hours

      Audience: Cyber Security professionals and Windows administrators

      Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

      Description:
      PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

      Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

      Objectives:

      PowerShell Overview

      • Getting started running commands
      • Security cmdlets
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.

      PowerShell Utilities and Tips

      • Customizing your profile script
      • PowerShell remote command execution
      • Security setting across the network
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Parsing Security Logs
      • Searching remote event logs
      • Mounting the registry as a drive
      • Security settings in the Registry
      • Exporting data to CSV, HTML and JSON files
      • Running scripts as scheduled jobs
      • Continued Security Compliance
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

      PowerShell Scripting

      • PowerShell Scripting to implement Security Practices
      • Writing your own functions to automate security status and settings
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, foreach, that make security decisions
      • How to pipe data in/out of your scripts for security compliance and reporting

      Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

      Course Overview:

      The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

      This course is designed to assist in your exam preparation for the CISM exam.

      Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

      Document Flow Chart iconsm

      Dates/Locations:

      Date/Time Event
      02/23/2026 - 02/27/2026
      08:00 -16:00
      TN-825: Certified Information Security Manager (CISM) Seminar
      TechNow, Inc, San Antonio TX
      08/17/2026 - 08/21/2026
      08:00 -16:00
      TN-825: Certified Information Security Manager (CISM) Seminar
      TechNow, Inc, San Antonio TX
      11/16/2026 - 11/20/2026
      08:00 -16:00
      TN-825: Certified Information Security Manager (CISM) Seminar
      TechNow, Inc, San Antonio TX

      Duration: 5 Days

      Course Objectives:

      • Information Security Governance (24%)
      • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
      • Information Risk Management (30%)
      • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
      • Information Security Program Development and Management (27%)
      • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
      • Information Security Incident Management (19%)
      • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

      Prerequisites:

      A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

      Comments

      Latest comments from students


      User: tracycampbell

      Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

      Facilities comments: The Home2Suites by Hilton was FANTASTIC!



      Liked the class?  Then let everyone know!

        

      Course Overview:

      TechNow’s CCSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Cloud Security Professional exam.  The exam covers (ISC)²’s 6 Domains from the Common Body of Knowledge, which encompass the whole of cloud security.

      This course is an intense 5 day program.  TechNow has a proven training and certification track record that you can depend on.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.   The instructor takes time to walk through scenarios that assume comprehensive knowledge of enterprise infrastructures.

      Attendees to CL-315: CCSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

      The 6 domains of the CCSP CBK:

      • Architectural Concepts & Design Requirements
      • Cloud Data Security
      • Cloud Platform & Infrastructure Security
      • Cloud Application Security
      • Operations
      • Legal & Compliance

      Duration: 5 days

      Audience:  Mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.   CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.

      DoD 8140:  Not Mandated

      Course Prerequisites:  IT professional with 5 years of experience, 3 years of security experience, and at least 1 year of cloud security experience.  GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.  This course is for those who are already qualified at the enterprise level for IT infrastructures, have Cloud experience, and are looking for a Cloud Security certification.

      Course Objectives:

      Domain 1: Architectural Concepts and Design Requirements

      • Module 1: Understand cloud computing concepts
      • Module 2: Describe cloud reference architecture
      • Module 3: Understand security concepts relevant to cloud computing
      • Module 4: Understand design principles of secure cloud computing
      • Module 5: Identify trusted cloud services

      Domain 2: Cloud Data Security

      • Module 1: Understand Cloud Data Life Cycle
      • Module 2: Design and Implement Cloud Data Storage Architectures
      • Module 3: Understand and implement Data Discovery and Classification Technologies
      • Module 4: Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
      • Module 5: Design and implement Data Rights Management
      • Module 6: Plan and Implement Data Retention, Deletion, and Archival policies
      • Module 7: Design and Implement Auditability, Traceability, and Accountability of Data Events

      Domain 3: Cloud Platform Infrastructure Security

      • Module 1: Comprehend Cloud Infrastructure Comp
      • Module 2: Analyze Risks Associated to Cloud Infrastructure
      • Module 3: Design and Plan Security Controls
      • Module 4: Plans Disaster Recovery & Business Continuity Management

      Domain 4: Cloud Application Security

      • Module 1: Recognize Need for Training and Awareness in Application Security
      • Module 2: Understand Cloud Software Assurance and Validation
      • Module 3: Use Verified Secure Software
      • Module 4: Comprehend the Software Development Life Cycle (SDLC) Process
      • Module 5: Apply the Secure Software Development Life Cycle
      • Module 6: Comprehend the Specifics of Cloud Application Architecture
      • Module 7: Design Appropriate Identity and Access Management (IAM) Solutions

      Domain 5: Operations

      • Module 1: Support the Planning Process for the Data Center Design
      • Module 2: Implement and Build Physical Infrastructure for Cloud Environment
      • Module 3: Run Physical Infrastructure for Cloud Environment
      • Module 4: Manage Physical Infrastructure for Cloud Environment
      • Module 5: Build Logical Infrastructure for Cloud Environment
      • Module 6: Run Logical Infrastructure for Cloud Environment
      • Module 7: Manage Logical Infrastructure for Cloud Environment
      • Module 8: Ensure Compliance with Regulations and Controls
      • Module 9: Conduct Risk Assessment to Logical and Physical Infrastructure
      • Module 10: Understand the Collection and Preservation of Digital Evidence
      • Module 11: Manage Communications with Relevant Parties

      Domain 6: Legal and Compliance

      • Module 1: Understand Legal Requirements and Unique Risks Within the Cloud Environment
      • Module 2: Understand Privacy Issues, Including Jurisdictional Variances
      • Module 3: Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
      • Module 4: Understand Implication of Cloud to Enterprise Risk Management
      • Module 5: Understand Outsourcing and Cloud Contract Design
      • Module 6: Execute Vendor Management

      Dates/Locations:

      No Events

       

      Comments

      Latest comments from students


      User: mrotek

      Instructor comments: Dave is an excellent instructor. Very knowledgeable on many levels of technology.


      User: fella

      Instructor comments: Very knowledgeable the security arena.

      Facilities comments: At our office.



      Next/Related Courses:

      CISSP Certification Seminar

       

       

      CCFE Core Competencies

      • Procedures and Legal Issues
      • Computer Fundamentals
      • Partitioning Schemes
      • Data Recovery
      • Windows File Systems
      • Windows Artifacts
      • Report writing (Presentation of Finding)
      • Procedures and Legal issues
      1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
      2. Ability to explain the on-scene action taken for evidence preservation.
      3. Ability to maintain and document an environment consolidating the computer forensics.
      • Computer Fundamentals
      1. Understand BIOS
      2. Computer hardware
      3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
      4. Knowledge of sectors, clusters, files.
      5. Understanding of logical and physical files.
      6. Understanding of logical and physical drives.
      • Partitioning schemes
      1. Identification of current partitioning schemes.
      2. Understanding of primary and extended partition.
      3. Knowledge of partitioning schemes and structures and system used by it.
      4. Knowledge of GUID and its application.
      • Windows file system
      1. Understanding of concepts of files.
      2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
      3. Identification, examination, analyzation of NTFS master file table.
      4. Understanding of $MFT structure and how they store data.
      5. Understanding of Standard information, Filename, and data attributes.
      • Data Recovery
      1. Ability to validate forensic hardware, software, examination procedures.
      2. Email headers understanding.
      3. Ability to generate and validate forensically sterile media.
      4. Ability to generate and validate a forensic image of media.
      5. Understand hashing and hash sets.
      6. Understand file headers.
      7. Ability to extract file metadata from common file types.
      8. Understanding of file fragmentation.
      9. Ability to extract component files from compound files.
      10. Knowledge of encrypted files and strategies for recovery.
      11. Knowledge of Internet browser artifacts.
      12. Knowledge of search strategies for examining electronic
      • Windows Artifacts
      1. Understanding the purpose and structure of component files that create the windows registry.
      2. Identify and capability to extract the relevant data from the dead registry.
      3. Understand the importance of restore points and volume shadow copy services.
      4. Knowledge of the locations of common Windows artifacts.
      5. Ability to analyze recycle bin.
      6. Ability to analyze link files.
      7. Analyzing of logs
      8. Extract and view windows logs
      9. Ability to locate, mount and examine VHD files.
      10. Understand the Windows swap and hibernation files.
      • Report Writing (Presentation of findings)
      1. Ability to conclude things strongly based on examination observations.
      2. Able to report findings using industry standard technically accurate terminologies.
      3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
      4. Be able to consider legal boundaries when undertaking a forensic examination