Course Overview:  PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats.  Successful completion of this course enables administrators to better understand the threat landscape.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats  (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 days

Course Objectives:   Students attending this training course will gain an understanding of cyberthreats and their characteristics.  Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.

Day 1

  • Mod 1: Threat Landscape
    • Advanced Persistent
    • Threats
    • Data Breaches and Tactics
    • Threat Management
    • Strategies
  • Mod 2: Integrated
    • Approach to Threat
    • Protection
    • Integrated Approach to
    • Protection
    • Next-Generation Firewall
    • Advanced Endpoint
    • Protection
  • Mod 3: Network Visibility
    • Zero Trust Model
    • SSL Decryption
    • Decryption Policy
  • Mod 4: Reducing the Attack
    • Surf
    • ection

 

Day 2

  • Mod 5: Handling Known
    • Threats
    • WildFire Analysis
    • Security Profiles
  • Mod 6: Handling Unknown
    • Traffic and Zero-Day Exploits
    • WildFire
    • Researching Threat Events
    • Identifying Unknown
    • Applications
  • Mod 7: Investigating
    • Breaches
    • Identify IOCs Using
    • App-Scope
    • Log Correlation
    • Finding Infected Host
  • Mod 8: Using Custom
    • Signatures
    • Creating Custom App-IDs
    • Threat Signatures

A

Prerequisites:

  • Students must complete the PA-213: Install, Configure, and Manage course
  • Understanding of network concepts, including routing, switching, and IP addressing
  • In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering

This course is in no way associated with Palo Alto Networks, Inc.

Comments

Latest comments from students


Like the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 12/08/2025 – 12/11/2025
    • San Antonio
  • CT-425: CompTIA Advanced Security Practitioner (CASP+)
    • 12/08/2025 – 12/12/2025
    • San Antonio
  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • in   
     

     

     

     

     

     

    Course Overview:

    PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

     

     

     

     

    What’s Included:

    • 5 days of instructor led in classroom training
    • Labs
    • PenTest+ Courseware
    • Exam Voucher
    • PenTest+ onsite exam scheduling

    Course Objectives:

    • Plan and scope penetration tests
    • Conduct passive reconnaissance
    • Perform non-technical tests to gather information
    • Conduct active reconnaissance
    • Analyze vulnerabilities
    • Penetrate networks
    • Exploit host-based vulnerabilities
    • Test application
    • Complete post-exploit tasks
    • Analyze and report pen test results

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

      • Module 01. Planning and Scoping Penetration Tests
      • Module 02. Conducting Passive Reconnaissance
      • Module 03. Performing Non-Technical Tests
      • Module 04. Conducting Active Reconnaissance
      • Module 05. Analyzing Vulnerabilities
      • Module 06. Penetrating Networks
      • Module 07. Exploiting Host-Based Vulnerabilities
      • Module 08. Testing Applications
      • Module 09. Completing Post-Exploit Tasks
      • Module 10. Analyzing and Reporting Pen Test Results

     

    Prerequisites:

    Target Audience:

    This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC²)®’s seven domains.

    Attendees to TN-715: Systems Security Certified Practitioner (SSCP) will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    01/12/2026 - 01/16/2026
    08:00 -16:00
    TN-715: Systems Security Certified Practitioner (SSCP)
    TechNow, Inc, San Antonio TX
    04/27/2026 - 05/01/2026
    08:00 -16:00
    TN-715: Systems Security Certified Practitioner (SSCP)
    TechNow, Inc, San Antonio TX
    07/13/2026 - 07/17/2026
    08:00 -16:00
    TN-715: Systems Security Certified Practitioner (SSCP)
    TechNow, Inc, San Antonio TX
    10/05/2026 - 10/09/2026
    08:00 -16:00
    TN-715: Systems Security Certified Practitioner (SSCP)
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Access Controls
    • Security Operations and Administration
    • Analysis and Monitoring
    • Cryptography
    • Networks and Telecommunications
    • Malicious Code/Malware
    • Risk, Response, and Recovery

    Prerequisites:

    • One year security experience
    • Some knowledge of the (ISC²)®’s seven domains

    Comments

    Latest comments from students


    User: boyleb15

    Instructor comments: Instructor was very knowledgeable on most items covered during this course. There were some topics he did lack the answer to. Instructor would also get sidetracked easily


    User: keginth

    Instructor comments: he was phenomenal with test prep and knew the book well

    Facilities comments: adequate


    Like the class?  Then let everyone know!

    TechNow has been involved in enterprise client server architectures since 1990.  TechNow has delivered  national and international implementations for Valero, Wholefoods, Quest, USAA, Golfsmith, AMD, Motorola, and many other fortune 1000 corporations, 

    TechNow's training program has followed the evolution of enterprise computing into virtualization and cloud computing. With a focus on security, TechNow can present the ramifications of many centralized strategies.  All courses utilize enterprise instructors with experience and can discuss the detail of implementation and the integration into an existing infrastructure.

    in