Course Overview:

This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.

NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment

Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
09/03/2025 - 09/05/2025
08:00 -16:00
AZ-900: Microsoft Azure Fundamentals
TechNow, Inc, San Antonio TX

Course Duration: 3 days

Course Outline:

  • Cloud Concepts
  • Core Azure Services
  • Security, Privacy, Compliance, And Trust
  • Azure Pricing and Support

Lab Objectives:

    • Create a virtual machine
    • Deploy Azure container instances
    • Create a virtual network
    • Create blob storage
    • Create a SQL database
    • Implement an Azure IoT Hub
    • Implement Azure Functions
    • Create a web app
    • Create a VM with a Template
    • Create a VM with PowerShell
    • Create a VM with CLI
    • Secure network traffic
    • Implement Azure key vault
    • Create an Azure Policy
    • Manage access with RBAC
    • Manage resource locks
    • Implement resource tagging
    • Exploring the Trust Center
    • Use the Azure Pricing Calculator
    • Use the Azure TCO Calculator
    • Open a Support request
    • Calculate composite SLAs
    • Access Azure Preview features

Prerequisites :

      • There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
      • This course is suitable for IT personnel who are just beginning to work with Azure.
      • This course primarily uses the Azure portal to create services and does not require scripting skills.
      • Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
      • This course provides an Azure pass and optional lab environment.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Course Overview:

This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years.  This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux.  RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course.  The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux.  The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.

Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

Day 1 and 2: Unix Review and Unix  Utilities

  • Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
  • Linux File, Directory, and Permissions Management
  • Linux  archives using tar and zip
  • Interacting with BASH
  • Review of Common Linux commands
  • Sorting files by line or field
  • Regular Expressions (meta character) with grep commands to locate specific lines in files
  • Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
  • Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
  • Miscellaneous commands Tr, sort, cut, past, pr -Lab
  • Performing non-interactive editing tasks with the sed command
  • Writing simple sed scripts to perform complex editing tasks
  • Using awk variables & arrays to sort data
  • Employing awk programs to manipulate numeric & textual data
  • Performing formatted printing in awk
  • Writing simple awk programs to write reports from data files
  • Using built-in awk functions & defining new functions
  • Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
 
Day 3 – Intro to Programming / Shell Scripting
  • Shell Review
  • Shell Interpretation of Quotes & Backslash
  • The Bash Shell
  • Shell's combined with UNIX utilities
  • Programming Basics
  • Data Constructs
  • Programming Looping
  • Your Environment
  • More on Parameters

Day 4 and 5 – Security Fundamentals, Linux Administration

  • System Configuration / Kernel overview 
  • System Maintenance / Disk and file admin
  • Using utilities for process control, locating files & automating maintenance tasks
  • System Startup / Boot Process – LILO & GRUB Configuration
  • Managing the Linux file system
  • Customization of setup files
  • Run Levels
  • Network Services / Configuration
  • User Management Monitoring, accessing & restricting root system access
  • Administration Tools
  • Process Control
  • Client side components of NFS, Samba, NTP, NIS
  • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.

Prerequisites:

  • Prior UNIX/Linux experience or training

Comments

Latest comments from students


User: mikenaya

Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.

Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.


User: fquinene

Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.

Facilities comments: Facility was fine


Liked the class?  Then let everyone know!

 

Course Overview:

 

This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations.  We have a suite of courses and certifications that help  understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.

The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.

This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python.  The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.

This course utilizes the “Violent Python” text book.

Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 3 Days

Course Objectives:

  • Python Lanuage Refress
  • Network Sockets
  • Exception Handling
  • Hashes and Cracking Passwords
  • Threading
    • Concepts and Python Implementation
    • Queues and Synchronization
    • urlparse and httplib to probe URLs
    • Crack a password protected zip file
  • Port Scanner
    • Threading a Port Scanner
  • nmap integration
  • Deploying shellcode
  • Mechanize, BeautifulSoup
    • HTTP Form Password Guessing
    • HTTP Proxies (Burp Suite)
    • HTTP Cookies Session Hijacking
      • CookieMonster
  • Images and Metadata
  • Justniffer
  • SQL Injection
    • sqlmap
    • SQLBrute
  • Antivirus and IDS evasion
    • PyInstaller
    • Metasploit
  • Scapy
    • Deploy shellcode
    • DNS Cache Poisoning
    • Packety Violence

Prerequisites:

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

Course Overview:

A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

What’s Included:

    • EC-Council official E-Courseware
    • EC-Council official Certificate of Attendance
    • EC-Council iLabs with access for 6 months
    • EC-Council CPENT Range access
    • CEH Exam Voucher

     

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Content:

      • Module 01. Introduction to Penetration Testing
      • Module 02. Penetration Testing Scoping and Engagement
      • Module 03. Open Source Intelligence (OSINT)
      • Module 04. Social Engineering Penetration Testing
      • Module 05. Network Penetration Testing – External
      • Module 06. Network Penetration Testing – Internal
      • Module 07. Network Penetration Testing – Perimeter Devices
      • Module 08. Web Application Penetration Testing
      • Module 09. Wireless Penetration Testing
      • Module 10. IoT Penetration Testing
      • Module 11. OT/SCADA Penetration Testing
      • Module 12. Cloud Penetration Testing
      • Module 13. Binary Analysis and Exploitation
      • Module 14. Report Writing and Post Testing Actions

     

    Prerequisites:

        • Pass the CEH exam
        • Pass the CND exam

    Target Audience:

    Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

TechNow has been involved in enterprise client server architectures since 1990.  TechNow has delivered  national and international implementations for Valero, Wholefoods, Quest, USAA, Golfsmith, AMD, Motorola, and many other fortune 1000 corporations, 

TechNow's training program has followed the evolution of enterprise computing into virtualization and cloud computing. With a focus on security, TechNow can present the ramifications of many centralized strategies.  All courses utilize enterprise instructors with experience and can discuss the detail of implementation and the integration into an existing infrastructure.

in