Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-913: Cloud Security Fundamentals
    • 05/27/2026 – 05/29/2026
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • RH-245: Linux System Administration I
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • in   

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.

    Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Accessing the Network
    • Advanced Fuzzing Techniques
    • Advanced Stack Smashing
    • Attacking the Windows Domain – Enumeration
    • Attacking the Windows Domain – Restricted Desktops
    • Attacking the Windows Domain – The Attacks
    • Building a Metasploit Module
    • Crypto for Penetration Testers
    • Exploiting the Network
    • Fuzzing Introduction and Operation
    • Introduction to Memory and Dynamic Linux Memory
    • Introduction to Windows Exploitation
    • Manipulating the Network
    • Python and Scapy For Penetration Testers
    • Shellcode
    • Smashing the Stack
    • Windows Heap Overflow Introduction
    • Windows Overflows

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: ryanv

    Instructor comments: Great.

    Facilities comments: N/A. Hotel.


    User: sean.hollinger

    Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow.

    Facilities comments: adequate


    Liked the class?  Then let everyone know!

    Certified Offensive AI Security Professional (COASP) validates the competencies required for practitioners who need to demonstrate offensive AI security skills, emulating adversaries, validating defenses, and leading red-team/blue-team exercises to keep AI resilient, reliable, and auditable

    The Certified Offensive AI Security Professional (COASP) equips you to identify and neutralize AI-specific threats before attackers do. And Bridges security, engineering, and data science so controls exist across the full AI life cycle.

    Participants will gain hands-on experience to perform end-to-end adversarial testing and deliver defensive validation evidence including the ability to simulate adversarial AI kill chains, Harden AI architectures by secure system prompts, context windows, tool integrations, RAG pipelines, and agent memory, Conducting AI security assessments aligned to MITRE ATLAS, OWASP LLM/ML Top 10, NIST AI RMF, and DoD Test & Evaluation practices , This course covers how to build SOC-ready capabilities for AI-focused detection logic, incident playbooks, and forensic procedures , & how to execute prompt injection, adversarial prompting , Assess AI supply-chain risk , Implement defensive engineering controls and Produce assurance and compliance artifacts.

    By the end of the course, learners will be well-prepared to take the Certified Offensive AI Security Professional (COASP) exam and demonstrate the ability to exploit vulnerabilities in LLMs and agents, and build defense that survive real world attacks, learners will master offensive techniques that break AI before the attackers do.

     

    Course Outline: 

    01. Offensive AI and AI System Hacking Methodology

    02. AI Reconnaissance and Attack Surface Mapping

    03. AI Vulnerability Scanning and Fuzzing

    04. Prompt Injection and LLM Application Attacks

    05. Adversarial Machine Learning and Model Privacy Attacks

    06. Data and Training Pipeline Attacks

    07. Agentic AI and Model-to-Model Attacks

    08. AI Infrastructure and Supply Chain Attacks

    09. AI Security Testing, Evaluation, and Hardening

    10. AI Incident Response and Forensics 

     

    Prerequisites: 

    TN-412: Artificial Intelligence Essentials (AI|E) 

     

    Dates/Locations:

    No Events

    Course Overview:

    In this course students will learn to configure the Linux kernel, install & configure modules, to install and configure non-default devices and automate installation with Kickstart. Students also utilize skills developed in L-245 to expand on file system configuration with spanning devices and RAID. This is the foremost server side Linux course in the industry covering all server side components such as DHCP, Samba, NIS, LDAP, inet, telnet ftp, dns, etc.  Expanding on security introduced in L-245: Linux System Administration I, TCP wrappers, firewalling with IP filters, SQUID, & ssh are covered.

    Attendees to L-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Custom installation of a Linux server
    • Linux device naming conventions & the boot process
    • Adding peripheral devices
    • Reconfiguring the kernel
    • Disk partitioning & formatting
    • Changing system run levels
    • Adding startup files for additional services
    • Adding & removing software packages
    • Disk & file system Administration
    • Terminals & modem configuration
    • Configuring NFS to support the client/server environment
    • Use the automounter
    • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
    • Troubleshooting techniques
    • Advanced Linux installation

    Prerequisites:

    Comments

    Latest comments from students



    Liked the class?  Then let everyone know!