Here are the General Unix course offerings:
Course Overview:
This course teaches students how to use the powerful PERL programming language, focusing on hands-on labs to promote retention & challenge students to apply their skills to new situations. PERL is a flexible, easy to use language suitable for many tasks such as system administration, web applications & database integration. System administrators, web programmers & database administrators will benefit from mastering this powerful programming language. This course reviews & builds on the information presented in PL-115: Fundamentals of Computer Programming.
Attendees to P-245: Programming with PERL will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Course Duration: 5 days
Course Objectives:
- Introduction
- Scalar Data
- Lists & Arrays
- Subroutines
- Input & Output
- Hashes
- In the World of Regular Expressions
- Matching with Regular Expressions
- Processing Text with Regular Expressions
- More Control Structures
- File Tests
- Directory Operations
- Strings & Sorting
- Process Management
- PERL Modules
- Some Advanced PERL Techniques
Prerequisites:
- Knowledge or experience in shell, C or another programming language is a great indicator of readiness
- Students who have never programmed before should take PL-115: Fundamentals of Computer Programming before taking this class
- Students looking to master PERL programming skills will greatly benefit from this course as well as P-315: Intermediate PERL Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Certified in Risk and Information Systems Control (CRISC), is for professionals responsible for an organization's risk management program. Students looking to acquire CRISC qualify themselves as IT security analyst, security engineer architect, information assurance program manager and senior IT auditor. CRISC certified professionals manage risk, design and oversee response measures, monitor systems for risk, and ensure the organization's risk management strategies are met.
The CRISC exam will primarily align with the terminology and concepts described in The Risk IT Framework, The Risk IT Practioner Guide, and COBIT 5. This will include applications in the evaluation and monitoring of IT-based risk, as well as the design and implementation of IS controls.
The CRISC exam covers four domains that are periodically updated to reflect the changing needs of the profession:
- Domain 1: Risk Identification
- Domain 2: Risk Assessment
- Domain 3: Risk Response and Mitigation
- Domain 4: Risk and Control Monitoring and Reporting
This course is designed to assist in your exam preparation for the CRISC exam.
Attendees to TN-835: Certified in Risk and Information Systems Control (CRISC) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Risk IT Framework—Purpose and Principles
- Essentials of Risk Governance, Evaluation, and Response
- Risk and Opportunity Management Using CobiT, Val IT and Risk IT
- The Risk IT Framework Process Model Overview
- Managing Risk in Practice—The Practitioner Guide Overview
- Overview of the Risk IT Framework Process Model
- The Risk IT Framework
Prerequisites:
A minimum of at least three (3) years of cumulative work experience performing the tasks of a CRISC professional across at least three (3) CRISC domains is required for certification. There are no substitutions or experience waivers.
Comments
Latest comments from students
User: tracycampbell
Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.
Facilities comments: The Home2Suites by Hilton was FANTASTIC!
Liked the class? Then let everyone know!
Course Overview:
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
04/13/2026 - 04/17/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
|
04/27/2026 - 05/01/2026 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
|
07/27/2026 - 07/31/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
|
12/07/2026 - 12/11/2026 08:00 -16:00 |
TN-822: Certified Information Systems Auditor (CISA) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Information Systems Auditing Process (18%)
- Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
- Governance & Management of IT (18%)
- This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
- Information Systems Acquisition, Development & Implementation (12%)
- Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
- Information Systems Operation & Business Resilience (26%)
- Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.s.
- Protection of Information Assets (26%)
- Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone Know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
No EventsDuration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!