Here are the Amazon Web Services (AWS) Security course offerings:
Here are the security courses specific to TechNow:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- N-595: VoIP Security Analysis and Design
- TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs)
- TN-315: Complete Hack and Defend
- TN-335: Advanced Penetration Testing Using Open Source Tools
- TN-345: Python for Penetration Testers
- TN-415: Computer Hacking Forensics Investigator (CHFI)
- TN-430: Elasticsearch Engineer (ELK)
- TN-515: Implementing Cybersecurity and Information Assurance Methodologies
- TN-535: Certified Forensic Computer Examiner (CFCE)
- TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies
- TN-545: Certified Network Defender
- TN-565: Nessus Vulnerability & Compliance Auditing
- TN-575: Open Source Network Security Monitoring
- TN-765: Automating Administration with Windows Powershell
- TN-801: Windows for Security Professionals
- TN-8155: HCISPP Preparation Seminar
- TN-855: Advanced and In-Depth ICD 503 RMF, Controls, and Assessments
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
Course Overview:
This course will be fast paced with in-depth and live demonstrations.
Date/Locations:
Duration: 1 day
Course Objectives:
- UEFI, SecureBoot, TPM, and Enterprise BitLocker
- Windows VPN in the Enterprise
- Windows Advanced Firewall
- Utilizing Windows WMI
- Administering Windows with Powershell
- Using Autopsy for Forensics
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.
Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
01/26/2026 - 01/30/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
04/20/2026 - 04/24/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
07/13/2026 - 07/17/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Unix Overview
- Introduction to the UNIX command Line
- Managing and controlling access to files
- Batch Scripting and tools
- Regular Expressions, Pipelines, and IO Redirection
- Text File Manipulation
- Basic Network Commands
- Managing Unix Processes
- GNOME Graphical Desktop
Prerequisites:
- Basic Knowledge of Computers
Comments
Latest comments from students
User: trkdashin
Instructor comments: Very knowledgeable
Facilities comments: Nice Hotel
Liked the class? Then let everyone know!
Course Overview:
This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.
Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Toolkit and Lab Assembly
- Malware Code and Behavioral Analysis Fundamentals
- Malicious Static and Dynamic Code Analysis
- Collecting/Probing System and Network Activities
- Analysis of Malicious Document Files
- Analyzing Protected Executables
- Analyzing Web-Based Malware
- DLL Construction and API Hooking
- Common Windows Malware Characteristics in x86 Assembly
- Unpacking Protected Malware
- In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
- In-Depth Analysis of Malicious Executables
- Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis
Prerequisites:
- Strong understanding of core systems and network concepts
- Exposure to programming and assembly concepts
- Comfortable with command line access
Comments
Latest comments from students
User: marcus.osullivan
Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.
Facilities comments: The baby deer were neat! I like the resort.