Course Overview:

 

This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations.  We have a suite of courses and certifications that help  understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.

The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.

This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python.  The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.

This course utilizes the “Violent Python” text book.

Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 3 Days

Course Objectives:

  • Python Lanuage Refress
  • Network Sockets
  • Exception Handling
  • Hashes and Cracking Passwords
  • Threading
    • Concepts and Python Implementation
    • Queues and Synchronization
    • urlparse and httplib to probe URLs
    • Crack a password protected zip file
  • Port Scanner
    • Threading a Port Scanner
  • nmap integration
  • Deploying shellcode
  • Mechanize, BeautifulSoup
    • HTTP Form Password Guessing
    • HTTP Proxies (Burp Suite)
    • HTTP Cookies Session Hijacking
      • CookieMonster
  • Images and Metadata
  • Justniffer
  • SQL Injection
    • sqlmap
    • SQLBrute
  • Antivirus and IDS evasion
    • PyInstaller
    • Metasploit
  • Scapy
    • Deploy shellcode
    • DNS Cache Poisoning
    • Packety Violence

Prerequisites:

Comments

Latest comments from students


  

Liked the class?  Then let everyone know!

 

Course Overview: 

In this course-currently the only offering in the market devoted to Group Policy training-you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.

Attendees to TN-5455: Managing Windows Environments with Group Policy will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Features and functions of Group Policy
  • Use Group Policy management tools to manage security policies
  • Design a Group Policy infrastructure
  • Group Policy processing architecture
  • Back up, restore, import, and copy Group Policy Objects through the Group Policy
  • Management Console
  • Use Windows PowerShell to manage Group Policy
  • Implement security using Group Policy
  • Configure the desktop environment with Group Policy
  • Configure roaming profiles and Folder Redirection
  • Assign and publish software packages
  • Implement AppLocker and software restriction policies
  • Create and deploy Administrative Templates
  • Configure Group Policy preferences

 

 

Course Prerequisites:

  • Experience with the Microsoft Windows Server 2008/12 environments and a fundamental understanding of Active Directory

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • CT-245: Linux+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • AZ-900: Microsoft Azure Fundamentals
    • 09/03/2025 – 09/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 09/08/2025 – 09/12/2025
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 09/08/2025 – 09/11/2025
    • San Antonio
  • in   

    Here are all of our Microsoft Server Products related courses:

    in   

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!