Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • TN-822: Certified Information Systems Auditor (CISA) Seminar
    • 10/06/2025 – 10/10/2025
    • San Antonio
  • CT-213: Cloud Essentials+
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • PM-223: Introduction to Project Management
    • 10/14/2025 – 10/16/2025
    • San Antonio
  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • in   

    We are often asked what is the recommended sequence of classes.  Here is our recommended sequence of classes for The Security Field.

    Certified Information Security Manager (CISM)

    CT-325 CompTIA Security+ Arrowright TN-825 Certified Information Security Manager

    Certified Information Systems Auditor(CISA)

    CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-822: Certified Information Systems Auditor (CISA)

    Certified Information Systems Security Professional(CISSP)

    CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-815 CISSP Certification Prep Seminar

     

    Course Overview:

    As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications.  In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP.   Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.  Other protocols such as Nortel's UNIStim will be addressed.  As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures.   Various open source tools including those in BackTrack are used for VoIP attacks.  A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.

    Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • VoIP Architecture
    • VoIP Signaling and media protocols
    • Common VoIP authentication mechanisms
    • Common VoIP encryption techniques
    • VoIP protocol analysis with Wireshark
    • Maintaining QoS while mitigating DoS
    • VoXML, XML, and application integration security
    • Converged network security design and implementation
    • Impact of NAT and firewalls
    • SIP, H.323, and MGCP vulnerabilities
    • VPN, IPsec and SRTP to secure VoIP services
    • Penetration testing with open source tools
    • Attacks for Eavesdropping, call redirection, and DoS
    • Design of hacked firmware virtualization layer
    • Concise lockdown steps for network hardware and VoIP

    Prerequisites:

    • This is an advanced Information Security Course which requires basic Windows & UNIX competency
    • Certification or 2 years of experience in these operating systems is highly recommended
    • As well as an understanding of TCP/IP

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    The RHCSA Rapid Track Course  is designed for experienced Linux® system administrators who want to expand their technical skill sets and become accredited with the Red Hat® Certified System Administration (RHCSA) certification. To successfully navigate this course, students should have experience with the Linux command line—including the necessary skills to execute common commands, such as cp, grep, sort, mkdir, tar, mkfs, ssh, and dnf—and be familiar with accessing man pages for help. At the completion of the course, students will be adequately prepared to take the RHCSA exam (EX200) .

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Introduce Linux and the Red Hat Enterprise Linux ecosystem.
    • Run commands and view shell environments.
    • Manage, organize, and secure files.
    • Manage users, groups and user security policies.
    • Control and monitor systemd services.
    • Configure remote access using the web console and SSH.
    • Configure network interfaces and settings.
    • Manage software using DNF
    • Access security files, file systems, and networks
    • Execute shell scripting and automation techniques
    • Manage storage devices, logical volumes, and file systems
    • Manage security and system access
    • Control the boot process and system services
    • Running containers

    Prerequisites:

    Experience in the field system administration.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

      

     

    Course Overview:  PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Class is a two-day course.  Students attending this course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.  Upon completion of this course, administrators will understand the Panorama server’s role in managing and securing their overall network.  Network professionals will learn to use Panorama’s aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.  This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.

    TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.  The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies.  Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221) Training Course will receive TechNow approved course materials and expert instruction.

     

    Dates/Locations:

    No Events

    Duration: 2 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama Management Server.

    Day 1

    • Module 0 – Introduction & Overview
    • Mod 1: Overview
      • Panorama Solution
      • Deployment Design
    • Mod 2: Initial Configuration
      • Interface Configuration
      • Setup Configurations
      • Device Deployment
      • Configuration Management
    • Mod 3: Templates
      • Templates Overview
      • Common Organization
      • Strategies
      • Configuring Templates
    • Mod 4: Device Groups
      • Device Groups
      • Objects
      • Policies
      • Device Group Commit

     

    Day 2

    • Mod 5: Administration
      • Admin Roles and Access
      • Control
      • Commit Procedure
    • Mod 6: Logging and
      • Reporting
      • Logging
      • Application Command
      • Center
      • App-Scope
      • Correlation Objects
      • Reports
    • Mod 7: Log Collectors
      • Plan a Log Collection
      • Deployment
      • Distributed Data Collection
      • Log Deployment
      • Configure Dedicated Log
      • Collector
      • Managed Collector Groups
    • Mod 8: Business Continuity
      • Panorama High Availability
      • Collector Group
      • Redundancy
      • Export Configuration
      • Disk Installation

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!