- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Course Overview:
PA-222: Palo Alto Networks Panorama Essentials Training Class is a two-day course that teaches students to configure and manage the Palo Alto Networks Panorama management server. Through hands-on training, students learn high end skills of how to integrate Palo Alto Networks next-generation firewalls into their network infrastructure and manage them with Palo Alto Networks Panorama management server.This is not a virtualized theoretical course. This is hands-on, real world in the classroom instructor led with lab assistance, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls and their enterprise management.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, Cisco, Unix, and Windows certifications.
Attendees to the Palo Alto Networks Panorama Essentials Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration 2 days
Course Objectives:
Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama management server, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS) through Panorama.
|
|
Prerequisites:
- Security+, Network+, Palo Alto Networks Firewall Essentials FastTrack and networking experience is recommended.
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students
Like the class? Then let everyone know!
Course Overview:
This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field. Assessors and Auditors have to face many technologies that are not part of the main stream. TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures. Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system. Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.
Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF. TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements. TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security. Cross Domain overlays are presented that fits the work flow of an assesor. PII overlays and any overlays that an organization uses and can be made available are also presented.
This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503. Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance. ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program. TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency. TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.
More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively. The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies. Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).
TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.
A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls. Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered. This course is not theory or death by power point. Real scenarios are presented as exercises. A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.
Date/Locations:
Duration: 5 days
Course Objectives:
- Establish a baseline of RMF knowledge
- Validate essential security controls, programs, and metrics
- DoD DCD 6/3 to ICD 503 Transition
- Lab Environtment and the Cyber Range
- Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
- Risk Assessment Report (RAR)
- Systems Security Plan (SSP)
- Security Assessment Report (SAR)
- Plans of Action and Milestone (POAM)
Prerequisites:
Experience in the field of auditing and assesments.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

What’s Included:
- 5 days of instructor led in classroom training
- Labs
- PenTest+ Courseware
- Exam Voucher
- PenTest+ onsite exam scheduling
Course Objectives:
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conduct active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test application
- Complete post-exploit tasks
- Analyze and report pen test results
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Planning and Scoping Penetration Tests
- Module 02. Conducting Passive Reconnaissance
- Module 03. Performing Non-Technical Tests
- Module 04. Conducting Active Reconnaissance
- Module 05. Analyzing Vulnerabilities
- Module 06. Penetrating Networks
- Module 07. Exploiting Host-Based Vulnerabilities
- Module 08. Testing Applications
- Module 09. Completing Post-Exploit Tasks
- Module 10. Analyzing and Reporting Pen Test Results
Prerequisites:
-
-
- CT-225: Network+
- CT-325: Security+
- 3-4 years of hands-on information security or related experience
-
Target Audience:
This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.
Comments
Latest comments from students
Liked the class? Then let everyone know!

Course Overview:
CT-225: Network+ is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client. The course also helps to prepare students for three popular certification examinations: CompTIA Network+, Microsoft Networking Essentials, and Novell Networking Technologies.
Attendees to CT-225: Network+ will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
05/04/2026 - 05/08/2026 08:00 -16:00 |
CT-225: Network+ TechNow, Inc, San Antonio TX |
|
08/03/2026 - 08/07/2026 08:00 -16:00 |
CT-225: Network+ TechNow, Inc, San Antonio TX |
|
11/02/2026 - 11/06/2026 08:00 -16:00 |
CT-225: Network+ TechNow, Inc, San Antonio TX |
Duration 5 days
Course Objectives:
- Identify basic network theory concepts and major network communications methods
- Describe bounded network media
- Describe unbounded network media
- Identify the major types of network implementations
- Identify TCP/IP addressing and data delivery methods
- Analyze routing and switching technologies
- Identify the components of a TCP/IP implementation
- Analyze network security
- Implement network security
- Identify the components of a WAN implementation
- Identify the components used in cloud computing and virtualization
- Identify the components of a remote network implementation
- Manage networks
- Troubleshoot network issues
Prerequisites:
- A+ Certification Course is recommended
Comments
Latest comments from students
User: hanbri9
Instructor comments: Great instructor.
Facilities comments: BEST HOTEL!!!!!!! AMAZING LOCATION, GOOD FOOD, NICE SPACE. The location of the hotel is what is almost the best about it. Driving up hwy 10 in the morning is absolutely awful.
Like the class? Then let everyone know!