TechNow provides a wide variety of skills based computer training and testing. With our Headquarters in San Antonio, TX, we have provided services including computer training around the United States to many individuals and corporations.
Our products and services are designed for those who are seeking to expand their knowledge base, whether with one class or a series of classes to gain certification in specific areas of training.
Our talented and knowledgeable instructors enjoy teaching and sharing their skills; allowing you to expand and learn essential computer skills.
This is a list of some of our Products and Services
Hardware, Software, and Consulting
Classroom in a Box
Authorized Testing Center
Customized Training
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.
Liked the class? Then let everyone know!
Course Overview:
In this course, the students will design various data platform technologies into solutions that are in line with business and technical requirements. This can include on-premises, cloud, and hybrid data scenarios which incorporate relational, NoSQL, or Data Warehouse data. They will also learn how to design process architectures using a range of technologies for both streaming and batch data. The students will also explore how to design data security, including data access, data policies, and standards. They will also design Azure data solutions, which includes the optimization, availability, and disaster recovery of big data, batch processing, and streaming data solutions.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to DP-201: Designing an Azure Data Solution will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 3 days
Course Outline:
- Data Platform Architecture Considerations
- Azure Batch Processing Reference Architectures
- Azure Real-Time Reference Architectures
- Data Platform Security Design Considerations
- Designing for Resiliency and Scale
- Design for Efficiency and Operations
Prerequisites :
-
-
- In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses:
- AZ-900: Microsoft Azure Fundamentals
- DP-200: Implementing an Azure Data Solution
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
We are often asked what is the recommended sequence of classes. Here is our recommended sequence of classes for The Security Field.
Certified Information Security Manager (CISM)
Certified Information Systems Auditor(CISA)
Certified Information Systems Security Professional(CISSP)