Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 05/04/2026 – 05/08/2026
    • San Antonio
  • CT-245: Linux+
    • 05/11/2026 – 05/15/2026
    • San Antonio
  • CT-210: Project+
    • 05/18/2026 – 05/21/2026
    • San Antonio
  • N-305: CCNA Bootcamp
    • 05/18/2026 – 05/22/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • in   
     

    Course Overview:

    TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

    TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

    This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

    Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Learn to comprehend and develop complex scenarios
    • Identify and create intelligence requirements through practices such as threat modeling
    • Utilize threat modeling to drive intelligence handling and practices 
    • Breakdown tactical, operational, and strategic-level threat intelligence
    • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
    • How to collect adversary information creating better value CTI
    • How to filter and qualify external sources, mitigating low integrity intelligence
    • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
    • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
    • Breaking down threats mapped against their tradecraft to tweak IOCs
    • Establish structured analytical techniques to be successful in any security role
    • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

    Course Prerequisites:

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination

     

     

     

     

     

     

     

    Course Overview:

    The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

    The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

    What’s Included:

    • 5 days of instructor-led in classroom training
    • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
    • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
    • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
    • CHFI Courseware
    • Exam Voucher
    • CHFI onsite exam scheduling

    Course Objectives:

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
    • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
    • Identify & check the possible source/ incident origin
    • Recover deleted files and partitions in Windows, MAC OS X, and Linux
    • Conduct reverse engineering for known and suspected malware files
    • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

    Dates/Locations:

    Date/Time Event
    06/29/2026 - 07/03/2026
    08:00 -16:00
    TN-415: Computer Hacking Forensics Investigator (CHFI)
    TechNow, Inc, San Antonio TX
    09/28/2026 - 10/02/2026
    08:00 -16:00
    TN-415: Computer Hacking Forensics Investigator (CHFI)
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Content:

      • Module 01. Computer Forensics in Today’s World
      • Module 02. Computer Forensics Investigation Process
      • Module 03. Understanding Hard Disks and File Systems
      • Module 04. Data Acquisition and Duplication
      • Module 05. Defeating Anti-forensics Techniques
      • Module 06. Operating System Forensics (Windows, Mac, Linux)
      • Module 07. Network Forensics
      • Module 08. Investigating Web Attacks
      • Module 09. Database Forensics
      • Module 10. Cloud Forensics
      • Module 10. Malware Forensics
      • Module 11. Investigating Email Crimes
      • Module 12. Investigating Email Crimes
      • Module 13. Mobile Forensics
      • Module 14. Forensics Report Writing and Presentation

     

    Prerequisites:

        • 2+ years of proven information security work experience
        • Educational background with digital security specialization

      Target Audience:

        • Law Enforcement
        • Defense & Military
        • E-Business Security
        • Systems Administrators
        • Legal Professionals
        • Banking & Insurance professionals
        • Government Agencies
        • IT Managers

    • Comments

      Latest comments from students


      Liked the class?  Then let everyone know!

     

    Course Overview:

    This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.

    Attendees to TN-765: Automating Administration with Windows Powershell will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

     

    • Describe the functionality of Windows PowerShell and use it to run and find basic commands
    • Identify and run cmdlets for server administration
    • Work with Windows PowerShell pipeline
    • Describe the techniques Windows PowerShell pipeline uses
    • Use PSProviders and PSDrives to work with other forms of storage
    • Query system information by using WMI and CIM
    • Work with variables, arrays, and hash tables
    • Write basic scripts in Windows PowerShell
    • Write advanced scripts in Windows PowerShell
    • Administer remote computers
    • Use background jobs and scheduled jobs
    • Use advanced Windows PowerShell techniques

     

    Course Prerequisites:

     

    • Experience with Windows networking technologies and implementation.
    • Experience with Windows Server administration, maintenance, and troubleshooting.

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!