- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
Course Overview:
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.
Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Implement network settings to provide a secure wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
Prerequisites:
- CCNA certification
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies
- General understanding of networks and wireless networks
- Routing and switching knowledge
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
Course Overview:
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.
Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Introduction to Privacy Program Management
- Module 2: Privacy Governance
- Module 3: Applicable Laws and Regulations
- Module 4: Data Assessments
- Module 5: Policies
- Module 6: Data Subjects’ Rights
- Module 7: Training and Awareness
- Module 8: Protecting Personal Information
- Module 9: Data Breach Incident Plans
- Module 10: Measuring, Monitoring and Auditing Program Performance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students
Liked the class? Then let everyone know!
(ISC)², CBK, and CISSP are registered marks of the International Information Systems Security Certification Consortium in the United States and other countries.
Access, Excel, Hyper-V, Outlook, Microsoft, SharePoint, Silverlight, SQL Server, Visual Basic, Win32, Windows, Windows PowerShell and Windows Server are registered trademarks of Microsoft Corporation.
Adobe, Acrobat, Flash and Photoshop are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries
Amazon Web Services is a trademark of Amazon.com, Inc.
Android is a trademark of Google Inc.
APMG-International Change Management, The APMG-International Change Management and Swirl Device logo, APMG-International AgilePM and The APMG-International AgilePM and Swirl Device logo are trademarks of The APM Group Limited.
Certified Ethical Hacker (CEH) is a registered trademark of EC-Council.
Cisco is a registered trademark of Cisco Systems Inc.
CMMI® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
CAPM, Certified Associate in Project Management (CAPM), PMP, Project Management Professional (PMP), PMI-ACP, PMI Agile Certified Practitioner (PMI-ACP), PMBOK, and the R.E.P. Logo are marks of Project Management Institute, Inc.
CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
Certified Business Analysis Professional, Certification of Competency in Business Analysis, Endorsed Education Provider, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
COBIT is a trademark of ISACA, registered in the U.S. and other countries.
COBIT® 5 is a trademark of the Information Systems Audit and Control Association® (ISACA®). This product includes COBIT® 5, used by permission of ISACA®. 2012© ISACA®. All rights reserved.
CompTIA A+ and CompTIA Network+ are registered trademarks of the Computing Technology Industry Association, Inc.
CompTIA CASP and CompTIA Cloud Essentials are trademarks of the Computing Technology Industry Association, Inc.
GIAC and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
Hadoop is a registered trademark of the Apache Software Foundation.
Hibernate is a registered trademark and servicemark of Red Hat, Inc.
iPad, iPhone, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
ITIL®, PRINCE2® and MSP® are registered trademarks of AXELOS Limited.
JavaScript, JavaServer, JavaServer Pages, Enterprise JavaBeans, MySQL and PL/SQL are trademarks of Oracle Corporation.
Linux is a registered trademark of Linus Torvalds.
Java and Oracle are registered trademarks of Oracle Corporation.
Palo Alto Networks, PAN-OS, App-ID, Content-ID, Url-ID, GlobalProtect, Wildfire, and Panorama are trademarks of Palo Alto Networks, Inc.
"Python" is a registered trademark of the Python Software Foundation, used by Learning Tree International with permission from the Foundation.
Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries.
Red Hat Middleware, LLC. All rights reserved.
SANS and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
SAP Crystal Reports is the registered trademark of SAP AG in Germany and in several other countries.
Scrum Alliance REPSM is a service mark of Scrum Alliance, Inc. Any unauthorized use is strictly prohibited.
TechNow® is a registered trademark of TechNow Incorporated.
The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved.
The Swirl logo™ is a trademark of AXELOS Limited.
Transact-SQL is a trademark of Sybase, Inc.
UNIX is a registered trademark of The Open Group.
VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
XML is a trademark of MIT, INRIA or Keio on behalf of the World Wide Web Consortium.