Course Overview:

A skills focus enables the student to better absorb the subject matter and perform successfully on the job.  This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs to secure Windows systems. Lecture and labs start with quick review of Active Directory and group policy to enforce security mechanisms within the Windows architecture.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations.  PowerShell is made for SecOps/DevOps automation and students will learn to write PowerShell scripts to automate security operations and Desired State Configuration (DSC).  The course concludes with exercising real attack strategies to demonstrate the effectives of properly securing your host.

Attendees to TN-969: Windows Security Administrator course will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Active Directory and BloodHound
  • Security Controls
  • PKI
  • Encryption
  • Wireless & Network Security and Hardening DNS
  • 802.1x and Endpoint Protection
  • Firewalls and VPN
  • PowerShell Scripting
  • JEA, DSC, Enterprise Security with PowerShell
  • Windows Attack Strategies

Prerequisites:

  • Security+
  • Windows System Administration Skills

 

Comments

Latest comments from students


User: bbrabender

Instructor comments: Instructor was very knowledgeable and help more inexperienced users with concepts as well explaining in a way that can be understood.

Facilities comments: N/A


User: dale.r.anderson

Instructor comments: Instructor was well knowlegeable accross alot of domains.

Facilities comments: Pretty good


Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • CT-215: Cloud+
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • TN-125: Introduction to UNIX and Linux
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • in   

    Course Overview:

    CT-205: A+ Certification Course provides students with the skills, knowledge and understanding that will enable them to install, configure, upgrade, troubleshoot and repair personal computer systems.  The A+ curriculum is excellent preparation for almost any computer related career or position.  This course lays the foundation for further study in networking and programming.  Designed for the new computer professional who has support knowledge of PC hardware, but needs to expand upon that knowledge.

    Attendees to CT-205: A+ Certification Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Identifying, Adding & Removing System Components
    • Installation, Configuring & System Optimization
    • Diagnosing & Troubleshooting Problems
    • Power Protection & Safety Procedures
    • Motherboards, Processors & Memory
    • Printers
    • Basic Networking
    • Operating System Fundamentals
    • Installation, Configuration & Upgrade
    • Diagnosing & Troubleshooting
    • Networks

    Prerequisites:

    • None

    Comments

    Latest comments from students


    User: whiggins29

    Instructor comments: Very knowledgeable, very engaging.


    User: jstuke12

    Instructor comments: Instructor was wonderful, Tim explained all questions fully and was a pleasure to learn from.

    Facilities comments: Facilities were outstanding.


    Like the class?  Then let everyone know!

    Increase your credibility, job security, and career opportunities by reaching your goal and getting certified!  TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class.  We have a proven testing program that will get you the results you want!

    in   

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Advanced Hash Manipulation
    • Command Shell vs. Terminal Access
    • Enumerating Users
    • Exploitation Fundamentals
    • Injection Attacks
    • Legal Issues
    • Metasploit
    • Moving Files with Exploits
    • Obtaining and Passing Password Representations
    • Overview of Passwords
    • Penetration Testing Foundations
    • Penetration Testing Process
    • Penetration Testing via the Command Line
    • Profiling the Target
    • Reconnaissance
    • Scanning for Targets
    • Using a Proxy to Attack a Web Application
    • Vulnerability Scanning
    • Wireless Crypto and Client Attacks
    • Wireless Fundamentals

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, networking, and security experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students



    User: kdwagoner

    Instructor comments: Very knowledgeable. Kept class focused and on task

    Facilities comments: Good


    Liked the class?  Then let everyone know!