Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-825: Certified Information Security Manager (CISM) Seminar
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • in   
     

    Course Overview:

    Learn to protect yourself and your company against hackers, by learning their tools and techniques, and then testing your network.  This course is heavily based on Kali and primarily on Metasploit.  In TN-315: Complete Hack and Defend class you will learn the step by step process that hackers use to assess your enterprise network, probe it & hack into it in mixed-platform environment including Windows, Linux, Solaris, and Cisco.  This course is 90% hacking, but  defenses for demonstrated hacks will be discussed.  If you want to know the ins and outs of the hacks presented in this course, then this is the course for you.

    Attendees to TN-315: Complete Hack & Defend Class Attendees will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Introduction to Pen Testing using the PTES model
    • Metasploit Basics
      • MSFconsole, MSFcli, Armitage, MSFpayload, MSFencode, NasmShell
    • Intelligence Gathering
      • Nmap, Databases in Metasploit, Port Scanning with Metasploit
    • Quick Intro to Ruby
      • Writing a simple Ruby script to create a custom scanner
    • Vulnerability Scanning
      • Importing Nessus Results
      • Scanning with Nessus from Within Metasploit
    • Exploitation
      • Using the Metasploit Framework and console to exploit
    • Meterpreter
      • Compromising a Windows System
      • Attacking MS SQL, xp_cmdshell
      • Dumping Usernames and Passwords, extracting and dumping hashes
      • Pass the Hash and Token Impersonation
      • Pivoting
      • Railgun
      • Using Meterpreter Scripts: Migrating a process, Killing AV, Persistence
    • Avoiding Detection
      • Creating Stand-Alone Binaries with MSFpayload
      • Encoding with MSFencode and Packers (go Green Bay:)
    • Exploitation Using Client Side Attacks
      • Introduction to Immunity Debugger
      • Using Immunity Debugger to Decipher NOP Shellcode
    • Metasploit Auxiliary Modules
    • Social Engineer Toolkit (SET)
      • Spear-Phishing, Web Attack
      • Creating a Multipronged Attack
    • Creating Your Own Module
      • Adapt an existing Module
      • Add some PowerShell and Run the Exploit
    • Meterpreter Scripting
    • Capture The Flag Exercise

    Prerequisites:

    • This is an advanced Information Security Course which requires basic Windows & UNIX competency
    • Certification or 2 years of experience in these operating systems is highly recommended
    • An understanding of TCP/IP

    Comments

    Latest comments from students


    User: dhonore

    Instructor comments: Dave's presentation style is engaging and lively.

    Facilities comments: The room was adequate for the needs of the class.


    User: phouck

    Instructor comments: David was very good. Although he went very fast at times.

    Facilities comments: The room was ok. it was bit dark.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

    Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Implement network settings to provide a secure wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    Prerequisites:

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This is an introductory course into the Python scripting language.  This class uses a hands-on approach in teaching the Python language.  This course builds the prerequisite skills for TechNow's P-345: Python for Pentration Testers course.  Getting comfortable with Python is important to understanding how Python can be utilitized for offensive measures.

    This course is hands-on with the instructor walking the students through many short examples to exemplify an objective.  Dexterity with the language comes through many small code examples to produce the desired result.  Students have fun acquiring points for all the code examples they get correct.  We must be having fun because TechNow is always amazed at how competitive students are in trying to acquire the most points!  

    The instructor will focus on the level that each student is currently at, and ensure the student absorbs the subject matter.  Programming is not a daily tasking of administrators or offensive operators and TechNow understands that.  As an instructor led course TechNow is very successful in making Python accessible to those who do not live eat and breath programming.  If a student's ultimate goal is to attend a course like TechNow's P-345: Python for Pentration Testers course, then not being bogged down in the Python language is critical, and this course (P-325: Python Programming) meets that objective.

    Recently we have introduced Raspberry Pi's and multiple sensors to the P-325: Python Programming course.  This enables the student to actually see productive results from their coding skills in the physical world!  Some examples that students create programs for are: Motion detectors, distance, temperature, cameras and keypads.

    Attendees to P-325: Python Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • How Python Runs Programs
    • Introducing Python Object Types
      • Numeric Types
      • Dynamic Typing
    • Variables
    • Regular Expressions
    • Strings
    • Conditionals
      • if Tests and Syntax Rules
    • Lists and Dictionaries
    • Tuples and Files
    • Introducing Python Statements
    • Assignments, Expressions, and Prints
    • while and for Loops
    • Iterations and Comprehensions
    • Documentation
    • Function Basics
    • Built-In Functions
    • Scopes
    • Arguments
    • Modules
    • Module Packages and Importing
    • Classes and OOP
    • Operator Overloading
    • Recursion
    • Exception Coding Details
    • Exception Objects
    • Unicode and Byte Strings
    • Working with Raspberry Pi
      • Writing code for sensors

    Prerequisites:

    • Experience with some form of programming is preferred

     

    Comments

    Latest comments from students


    User: slewis8435

    Instructor comments: Very good instructor - he was excited about the material, very knowledgeable, and explained things clearly.

    Facilities comments: The facilities were fine - plenty of room for each student to set up an extra computer and have room for note taking


    User: nathan.karras

    Instructor comments: Instructor was extremely knowledgeable in programming and scripting. He encouraged students to explore and ask questions. He would work with individuals to troubleshoot lab problems sets. Would highly recommend as an instructor.

    Facilities comments: Room got a little warn. Instructor purchased fans to cool things off for the class. Projector had over scan.


    Liked the class?  Then let everyone know!

    Basic Information:

    Contract Number: GS-35F-0365L Period Covered: April 24, 2001 to April 23, 2021

    Products and ordering information is in this Authorized FSS Information Technology Schedule. Price List’s are also available on the GSA Advantage! System. Agencies can browse GSA Advantage! by accessing the Federal Supply Service’s Home Page via the Internet at GSA.gov.

    in