Here are the General Unix course offerings:
Course Overview:
Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.
Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.
Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Data Protection Laws
- Module 2: Personal Data
- Module 3: Controllers and Processors
- Module 4: Processing Personal Data
- Module 5: Information Provision
- Module 6: Data Subjects’ Rights
- Module 7: Security of Processing
- Module 8: Accountability
- Module 9: International Data Transfers
- Module 10: Supervisions and Enforcement
- Module 11: Compliance.
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The UNIX Security Administrator Prep is a hands-on course that covers how to secure and audit UNIX and Linux operating systems. This includes concepts such as Rootkits, Buffer overflows, and monitoring UNIX/Linux systems.
Attendees to TN-959: Unix Security Administratorwill receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- AIDE
- Apache
- Best Practices for Kernel Tuning and Warning Banners
- Boot Services
- Chroot()
- DNS- BIND
- DNSSec
- Evidence Collection and Preservation
- Forensic Analysis
- Forensic Preparation and Incident Handling
- Host Based Firewalls – iptables
- Intro to Forensics
- OS Install and Patching
- Physical, User Account, and Password Access Control
- Se Linux
- Sendmail
- SSH
- Stack Smashing
- Sudo
- Syslog-NG
- UNIX Logging
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: wbcarter
Instructor comments: Good Stuff. Thanks!
User: ryuhas
Instructor comments: Very Good Instructor
Facilities comments: Facilities was great. Location had a lot to be desired. To much traffic and accidents trying to get here.
Liked the class? Then let everyone know!
Course Overview:
The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network. Let us help you prepare for the CompTIA Security+ exam (SY0-701).
TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.
Attendees to CT-325: Security+ will receive TechNow approved course materials and TechNow expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/09/2026 - 02/13/2026 08:00 -16:00 |
CT-325: Security+ TechNow – San Antonio, TX, San Antonio TX |
|
04/13/2026 - 04/17/2026 08:00 -16:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
|
07/06/2026 - 07/10/2026 08:00 -16:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
|
09/21/2026 - 09/25/2026 08:00 -16:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
|
11/16/2026 - 11/20/2026 08:00 -16:00 |
CT-325: Security+ TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Compare and contrast attacks
- Compare and contrast security controls
- Use security assessment tools
- Explain basic cryptography concepts
- Implement a public key infrastructure
- Implement identity and access management controls
- Manage access services and accounts
- Implement a secure network architecture
- Install and configure security appliances
- Install and configure wireless and physical access security
- Deploy secure host, mobile, and embedded systems
- Implement secure network access protocols
- Implement secure network applications
- Explain risk management and disaster recovery concepts
- Describe secure application development concepts
- Explain organizational security concepts
Prerequisites:
- CompTIA A+ and Network+ certifications, or equivalent knowledge.
- Windows 7/8/10 and Server 2008/2012/2016 experience required.
- Six to nine months experience in networking, including experience in configuring & managing TCP/IP.
Comments
Latest comments from students
User: joshjepsen@hotmail.com
Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.
Liked the class? Then let everyone know!
Windows Security Automation and Threat Hunting with PowerShell Seminar
Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA
Date: October 10, 2018 8:00am – 4:00pm
Duration: 8 hours
Audience: Cyber Security professionals and Windows administrators
Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.
Description:
PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.
Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.
Objectives:
PowerShell Overview
- Getting started running commands
- Security cmdlets
- Using and updating the built-in help
- Execution policies
- Fun tricks with the ISE graphical editor
- Piping .NET and COM objects, not text
- Using properties and methods of objects
- Helping Linux admins feel more at home
- Aliases, cmdlets, functions, modules, etc.
PowerShell Utilities and Tips
- Customizing your profile script
- PowerShell remote command execution
- Security setting across the network
- File copy via PowerShell remoting
- Capturing the output of commands
- Parsing text files and logs with regex patterns
- Parsing Security Logs
- Searching remote event logs
- Mounting the registry as a drive
- Security settings in the Registry
- Exporting data to CSV, HTML and JSON files
- Running scripts as scheduled jobs
- Continued Security Compliance
- Pushing out scripts through Group Policy
- Importing modules and dot-sourcing functions
- http://www.PowerShellGallery.com
PowerShell Scripting
- PowerShell Scripting to implement Security Practices
- Writing your own functions to automate security status and settings
- Passing arguments into your scripts
- Function parameters and returning output
- Flow control: if-then, foreach, that make security decisions
- How to pipe data in/out of your scripts for security compliance and reporting
Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]