- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Course Overview:
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

What’s Included:
- 5 days of instructor led in classroom training
- Labs
- PenTest+ Courseware
- Exam Voucher
- PenTest+ onsite exam scheduling
Course Objectives:
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conduct active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test application
- Complete post-exploit tasks
- Analyze and report pen test results
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Planning and Scoping Penetration Tests
- Module 02. Conducting Passive Reconnaissance
- Module 03. Performing Non-Technical Tests
- Module 04. Conducting Active Reconnaissance
- Module 05. Analyzing Vulnerabilities
- Module 06. Penetrating Networks
- Module 07. Exploiting Host-Based Vulnerabilities
- Module 08. Testing Applications
- Module 09. Completing Post-Exploit Tasks
- Module 10. Analyzing and Reporting Pen Test Results
Prerequisites:
-
-
- CT-225: Network+
- CT-325: Security+
- 3-4 years of hands-on information security or related experience
-
Target Audience:
This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.
Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Packages and namespaces
- References and scoping
- Manipulating complex data structures
- Object-oriented programming
- Writing and using modules
- Testing PERL code
- Contributing to CPAN
Prerequisites:
- P-245: Programming with PERL or equivalent knowledge and skills
Comments
Latest comments from students
User: J Masters
Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.
Liked the class? Then let everyone know!
CCFE Core Competencies
- Procedures and Legal Issues
- Computer Fundamentals
- Partitioning Schemes
- Data Recovery
- Windows File Systems
- Windows Artifacts
- Report writing (Presentation of Finding)
- Procedures and Legal issues
- Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
- Ability to explain the on-scene action taken for evidence preservation.
- Ability to maintain and document an environment consolidating the computer forensics.
- Computer Fundamentals
- Understand BIOS
- Computer hardware
- Understanding of numbering system (Binary, hexadecimal, bits, bytes).
- Knowledge of sectors, clusters, files.
- Understanding of logical and physical files.
- Understanding of logical and physical drives.
- Partitioning schemes
- Identification of current partitioning schemes.
- Understanding of primary and extended partition.
- Knowledge of partitioning schemes and structures and system used by it.
- Knowledge of GUID and its application.
- Windows file system
- Understanding of concepts of files.
- Understanding of FAT tables, root directory, subdirectory along with how they store data.
- Identification, examination, analyzation of NTFS master file table.
- Understanding of $MFT structure and how they store data.
- Understanding of Standard information, Filename, and data attributes.
- Data Recovery
- Ability to validate forensic hardware, software, examination procedures.
- Email headers understanding.
- Ability to generate and validate forensically sterile media.
- Ability to generate and validate a forensic image of media.
- Understand hashing and hash sets.
- Understand file headers.
- Ability to extract file metadata from common file types.
- Understanding of file fragmentation.
- Ability to extract component files from compound files.
- Knowledge of encrypted files and strategies for recovery.
- Knowledge of Internet browser artifacts.
- Knowledge of search strategies for examining electronic
- Windows Artifacts
- Understanding the purpose and structure of component files that create the windows registry.
- Identify and capability to extract the relevant data from the dead registry.
- Understand the importance of restore points and volume shadow copy services.
- Knowledge of the locations of common Windows artifacts.
- Ability to analyze recycle bin.
- Ability to analyze link files.
- Analyzing of logs
- Extract and view windows logs
- Ability to locate, mount and examine VHD files.
- Understand the Windows swap and hibernation files.
- Report Writing (Presentation of findings)
- Ability to conclude things strongly based on examination observations.
- Able to report findings using industry standard technically accurate terminologies.
- Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
- Be able to consider legal boundaries when undertaking a forensic examination
Course Overview:
With tight pressure to cut costs & yet implement technology quickly, IT project managers are under severe pressure to complete projects on time, on budget, & at the promised quality. Yet industry figures consistently show that 90 percent of major IT project initiatives fail to be complete both on time and on budget. This course delves into the unique challenges of managing IT projects, and offers a roadmap to success.
PM-223 offers new Project Managers the best start into the Project Management field. This course is intended to offer the new Project Manager a practical introduction to Project Management. If you are new to Project Management and are looking for a first step on your way to the Project Manager Professional certification, then this is the course for you.
Attendees to PM-223: Introduction to Project Management will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
01/20/2026 - 01/22/2026 08:00 -16:00 |
PM-223: Introduction to Project Management TechNow, Inc, San Antonio TX |
|
04/06/2026 - 04/08/2026 08:00 -16:00 |
PM-223: Introduction to Project Management TechNow, Inc, San Antonio TX |
|
07/01/2026 08:00 -16:00 |
PM-223: Introduction to Project Management TechNow, Inc, San Antonio TX |
|
09/08/2026 - 09/10/2026 08:00 -16:00 |
PM-223: Introduction to Project Management TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- The 5 Process Groups
- Building a WBS
- Estimating work
- Budgets
- Practical Leadership
- Ending a Project
Prerequisites:
- None
Comments
Latest comments from students
User: marcus.resendez
Instructor comments: Extremely well versed with pertinent course information. Outstanding instructor!
Facilities comments: Nice
User: mendezm
Instructor comments: Instructor was extremely knowledgeable on the subject.