Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-913: Cloud Security Fundamentals
    • 05/27/2026 – 05/29/2026
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • RH-245: Linux System Administration I
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • in   

    Course Overview:

    The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

    Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Implement network settings to provide a secure wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    Prerequisites:

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

     Cisco DoD Comply-to-Connect (C2C) course teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.

    This training also earns you 32 Continuing Education (CE) credits toward recertification.

    Dates/Locations:

    No Events

    Duration: 5 days

     

    Course Outline: 

    Section 1: C2C Fundamentals

    • Comply to Connect Overview
    • From C2C to ZTA
    • Steps to Implement C2C

    Section 2: Cisco Identity-Based Networking Services

    • Cisco IBNS Overview
    • AAA Role in Cisco IBNS
    • Compare Cisco IBNS and Cisco ISE Solutions
    • Explore Cisco IBNS Architecture Components

    Section 3: Introducing Cisco ISE Architecture

    • Cisco ISE as a Network Access Policy Engine
    • Cisco ISE Use Cases
    • Cisco ISE Functions

    Section 4: Introducing Cisco ISE Deployment

    • Cisco ISE Deployment Models
    • Cisco ISE Licensing and Network Requirements
    • Cisco ISE Context Visibility Features
    • New Features in Cisco ISE 3.X

    Section 5: Introducing Cisco ISE Policy Enforcement Components

    • 802.1X for Wired and Wireless Access
    • MAC Authentication Bypass for Wired and Wireless Access
    • Identity Management
    • Active Directory Identity Source
    • Additional Identity Sources
    • Certificate Services

    Section 6: Introducing Cisco ISE Policy Configuration

    • Cisco ISE Policy
    • Cisco ISE Authentication Rules
    • Cisco ISE Authorization Rules

    Section 7: PKI and Advanced Supplicants

    • Public Key Infrastructure (PKI)
    • TEAP in Comply to Connect (C2C)
    • Secure Client ISE features and Configuration for C2C

    Section 8: Introducing the Cisco ISE Profiler

    • Web Access with Cisco ISE
    • ISE Profiler
    • Cisco ISE Probes
    • Profiling Policy
    • Custom Attributes in Profile

    Section 9: Introducing Cisco ISE Endpoint Compliance Services

    • Endpoint Compliance Services Overview

    Section 10: Configuring Client Posture Services and Compliance

    • Client Posture Services and Provisioning Configuration

    Section 11: Introducing Profiling Best Practices and Reporting

    • Profiling Best Practices

    Section 12: C2C Use Cases

    • Cisco CX ISE Reporting Tool
    • ISE Reporting
    • ISE Hardening
    • Profiling Best Practices for C2C

    Section 13: C2C Third-Party Integrations-Tenable

    • Tenable Use Case
    • Tenable Overview and Capabilities
    • Tenable Integration Prerequisites
    • Tenable Integration Configuration
    • Policy Design
    • Policy Enforcement
    • Enforcement Verification

    Section 14: C2C Third-Party Integrations-MECM

    • MECM Use Case
    • MECM Overview and Capabilities
    • MECM Integration Prerequisites
    • MECM Integration Configuration
    • Policy Design
    • Policy Enforcement
    • Enforcement Verification

    Section 15: C2C Third-Party Integrations-Trellix

    • Trellix Use Case
    • Trellix Overview and Capabilities
    • Trellix Integration Prerequisites
    • Trellix Integration Configuration
    • Policy Enforcement
    • Enforcement Verification

    Section 16: Troubleshooting Cisco ISE Policy and Third-Party NAD

    • Cisco ISE Third-Party Network Access Device Support
    • Troubleshooting Cisco ISE Policy Configuration

    Section 17: Exploring Cisco TrustSec

    • Cisco TrustSec Overview
    • Cisco TrustSec Enhancements
    • Cisco TrustSec Configuration

    Section 18: Working with Network Access Devices

    • Reviewing AAA
    • Cisco ISE TACACS+ Device Administration
    • Configuring TACACS+ Device Administration
    • TACACS+ Device Administration Guidelines and Best Practices

     

    Course Prerequisites: 

    There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

    • Familiarity with 802.1X
    • Familiarity with Microsoft Windows Operating Systems
    • Familiarity with Cisco IOS CLI for wired and wireless network devices
    • Familiarity with Cisco Identity Service Engine
     

    Course Overview:

    This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform.  The course focuses on C# program structure, language syntax & implementation details.  C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++.  It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.

    Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Overview of the Microsoft .NET Platform Overview of C#
    • Using Value-Type Variables
    • Statements & Exceptions
    • Methods & Parameters
    • Arrays
    • Essentials of Object-Oriented Programming
    • Using Reference-Type Variables
    • Creating & Destroying Objects
    • Inheritance in C#
    • Aggregation, Namespaces & Advanced Scope
    • Operators & Events Properties & Indexes
    • Attributes

    Prerequisites:

    • Experience with programming in C, C++, Visual Basic, Java or another programming language

     

    Comments

    Latest comments from students


    User: jdmccol

    Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.

    Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.



     

    Liked the class?  Then let everyone know!