Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • TN-822: Certified Information Systems Auditor (CISA) Seminar
    • 10/06/2025 – 10/10/2025
    • San Antonio
  • CT-213: Cloud Essentials+
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • PM-223: Introduction to Project Management
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • in   

    Course Overview:

    PowerShell is made for Security Operations (SecOps) automation on Windows. SecOps requires automation in order to scale out security changes and monitoring beyond a handful of hosts. For example, when a vulnerability must be remediated but there is no patch for it yet, automation is needed to quickly and consistently enact the changes necessary. PowerShell “remoting” is encrypted remote command execution of PowerShell scripts in a way that can scale to thousands of endpoints and servers.

    Imagine being able to hunt for indicators of compromise across thousands of machines with just a few lines of PowerShell code. Or imagine having the local Administrator account password reset every night on thousands of endpoints in a secure way, and being able to retrieve that password securely too.

    We will show you to do these tasks and more. Transcription logging for forensics, strong encryption code signing, application whitelisting of scripts, IPSec port control, and Just Enough Admin (JEA).

    As more and more of our systems are moved up to the cloud, PowerShell will become even more important. Amazon Web Services, Microsoft Azure, Office 365, Hyper-V and VMware already support PowerShell administration for many tasks.

    Attendees to TN-963: Windows Security Automation with PowerShell will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 3 days

    Course Objectives:

    Day One
    PowerShell Overview and Tips

      • Getting started running commands
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.
      • Customizing your profile script

    What Can We Do With PowerShell

      • PowerShell remote command execution
      • Fan-out remoting and security
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Searching remote event logs faster with XPath
      • Mounting the registry as a drive
      • Exporting data to CSV, HTML and JSON files
      • Parsing and mining nmap port scanner XML output
      • Running scripts as scheduled jobs
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

    Write your own scripts

      • Writing your own functions
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, do-while, foreach, switch
      • The .NET Framework class library: a playground
      • How to pipe data in/out of your scripts

    Day Two
    Continuous Secure Configuration Enforcement

      • How to use Group Policy and PowerShell together
      • Automate with INF security templates
      • How to customize INF templates
      • Microsoft Security Compliance Manager (SCM)
      • SECEDIT.EXE scripting
      • Building an in-house security repository for SecOps/DevOps
      • NSA’s Secure Host Baseline GPOs

    Group Policy Precision Targeting

      • Managing Group Policy Objects (GPOs) with PowerShell
      • LSDOU, Block Inheritance, Enforced GPOs
      • Group Policy permissions for targeting changes
      • ADMX templates for mass registry editing
      • Deploying PowerShell startup and logon scripts
      • WMI item-level targeting of GPO preferences
      • GPO scheduled tasks to run PowerShell scripts
      • Remote command execution via GPO (not remoting)
      • Empowering the Hunt Team to fight back!

    Server Hardening for SecOps/DevOps

      • Server Manager scripting with PowerShell
      • Adding and removing roles and feature
      • Remotely inventory roles, features, and apps
      • Why Server Nano or Server Core
      • Running PowerShell automatically after service failure
      • Service account identities, passwords, and risks
      • Tools to reset service account passwords securely

    Day Three
    PowerShell Desired State Configuration (DSC)

      • DSC is Configuration Management built in for free
      • Using DSC for continuous reinforcement of settings
      • Writing your own DSC configuration scripts
      • Free DSC resource modules: www.PowerShellGallery.com
      • How to push DSC configurations to many targets
      • DSC background job processing in push mode
      • Examples: sync files, install roles, manage groups
      • Auditing a remote target against a DSC MOF template
      • “ApplyAndAutoCorrect” mode for continuous enforcement

    PowerShell Just Enough Admin (JEA)

      • JEA is Windows sudo, like on Linux
      • JEA is Windows setuid root, like on Linux
      • Restricting commands and arguments
      • Verbose transcription logging
      • How to set up and configure JEA
      • Privilege Access Workstations (PAWs)

    PowerShell and WMI

      • Windows Management Instrumentation (WMI) service
      • What is WMI and why do hackers abuse it so much?
      • Using PowerShell to query WMI CIM classes
      • WMI authentication and traffic encryption
      • Inventory operating system versions and installed software
      • WMI remote command execution versus PowerShell remoting
      • PowerShell security best practices
      • PowerShell transcription logging to catch hackers

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course is developed for those individuals seeking to pass the Project Management Institute’s PMI-ACP Exam. PMI Agile Certified Practitioner (PMI-ACP)® is one of the newest certifications offered by PMI and is expected to become the industry standard certification for agile over the next few years. The PMI-ACP® certification clearly illustrates to colleagues, organizations or even potential employers that students are ready and able to lead in this new age of product development, management, and delivery.

    While preparing you for the exam, you will explore various approaches to agility including Scrum, Kanban, Lean, Extreme Programming (XP), and Test-Driven Development (TDD). By the end of the course, you’ll have mastered the practices and techniques that Agile practitioners use to improve team performance, resolve problems and engage in continuous process improvements and be equipped with job-ready skills.

    This course provides students with 21 contact hours in agile practices to help attain the Project Management Institute (PMI)® credential.  PMI® and PMI-ACP® are registered marks of the Project Management Institute, Inc.

    Attendees to PM-224: PMI Agile Certified Practitioner (PMI-ACP) Prep Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    11/17/2025 - 11/19/2025
    08:00 -16:00
    PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    TechNow, Inc, San Antonio TX

    Duration: 4 Days

    Course Objectives:

    • Agile Principles and Mindset
    • Value-driven delivery
    • Stakeholder engagement
    • Team performance
    • Adaptive planning
    • Problem detection and Resolution
    • Continuous Improvement

    Prerequisites:

    • Secondary degree
    • 21 contact hours of training in agile practices
    • 12 months of general project experience within the last 5 years. A current PMP® or PgMP® will satisfy this requirement but is not required to apply for the PMI-ACP
    • 8 months of agile project experience within the last 3 years

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

    PP-244: CIPM + CIPP/E 4 Day GDPR Ready

     

    Course Overview:

    A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.

    With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.

    The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education. 

    What’s Included:

    • Authorized courseware
    • 2 Exam vouchers
    • IAPP membership

    **GDPR Regulation Mandated May 25, 2018**

    Course Objectives:

    See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance

    See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance

    Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.

    TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

    TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 4 Days

    Course Content:

     

    Prerequisites: None

    Target Audience:

    Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!