Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-325: Security+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • VM-315: VMware Infrastructure: Install, Configure, and Manage
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • CT-215: Cloud+
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • in   

    TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

    A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

    We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Advanced Hash Manipulation
    • Command Shell vs. Terminal Access
    • Enumerating Users
    • Exploitation Fundamentals
    • Injection Attacks
    • Legal Issues
    • Metasploit
    • Moving Files with Exploits
    • Obtaining and Passing Password Representations
    • Overview of Passwords
    • Penetration Testing Foundations
    • Penetration Testing Process
    • Penetration Testing via the Command Line
    • Profiling the Target
    • Reconnaissance
    • Scanning for Targets
    • Using a Proxy to Attack a Web Application
    • Vulnerability Scanning
    • Wireless Crypto and Client Attacks
    • Wireless Fundamentals

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, networking, and security experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students



    User: kdwagoner

    Instructor comments: Very knowledgeable. Kept class focused and on task

    Facilities comments: Good


    Liked the class?  Then let everyone know!

     

    Course Overview:

    This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.

    NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment

    Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    01/20/2026 - 01/23/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    04/07/2026 - 04/08/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    08/03/2026 - 08/04/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX
    11/09/2026 - 11/10/2026
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX

    Course Duration: 3 days

    Course Outline:

    • Cloud Concepts
    • Core Azure Services
    • Security, Privacy, Compliance, And Trust
    • Azure Pricing and Support

    Lab Objectives:

      • Create a virtual machine
      • Deploy Azure container instances
      • Create a virtual network
      • Create blob storage
      • Create a SQL database
      • Implement an Azure IoT Hub
      • Implement Azure Functions
      • Create a web app
      • Create a VM with a Template
      • Create a VM with PowerShell
      • Create a VM with CLI
      • Secure network traffic
      • Implement Azure key vault
      • Create an Azure Policy
      • Manage access with RBAC
      • Manage resource locks
      • Implement resource tagging
      • Exploring the Trust Center
      • Use the Azure Pricing Calculator
      • Use the Azure TCO Calculator
      • Open a Support request
      • Calculate composite SLAs
      • Access Azure Preview features

    Prerequisites :

        • There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
        • This course is suitable for IT personnel who are just beginning to work with Azure.
        • This course primarily uses the Azure portal to create services and does not require scripting skills.
        • Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
        • This course provides an Azure pass and optional lab environment.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This course delivers the technical knowledge, insight, and hands-on training to receive in-depth knowledge on Wireshark® and TCP/IP communications analysis. You will learn to use Wireshark to identify the most common causes of performance problems in TCP/IP communications. You will learn about the underlying theory of TCP/IP and the most used application protocols, so that you can intelligently examine network traffic for performance issues or possible Indicators of Compromise (IoC).

    Duration: 5 Days

    Audience:

    Anyone interested in learning to troubleshoot and optimize TCP/IP networks and analyze network traffic with Wireshark, especially network engineers, information technology specialists, and security analysts.

    Course Prerequisites:

    We recommend that attendees of this course have the following prerequisite:
    • Network+

    Dates/Locations:

    No Events

    Course Outline:

    DAY ONE

    Course Set Up and Analyzer Testing

    Network Analysis Overview
    Wireshark Functionality Overview
    Capturing Wired and Wireless Traffic
    Define Global and Personal Preferences for Faster Analysis
    Defined Time Values and Interpret Summaries
    Interpret Basic Trace File Statistics to Identify Trends
    Create and Apply Display Filters for Efficient Analysis

    DAY TWO

    Follow Streams and Reassemble Data
    Use Wireshark’s Expert System to Identify Anomalies
    TCP/IP Analysis Overview
    Analyze Common TCP/IP Traffic Patterns

    DAY THREE

    Graph I/O Rates and TCP Trends
    802.11 (WLAN) Analysis Fundamentals
    Voice over IP (VoIP) Analysis Fundamentals
    Network Forensics Fundamentals

    DAY FOUR

    Detect Scanning and Discovery Processes
    Analyze Suspect Traffic

    DAY FIVE

    Use Command‐Line Tools

    Next/Related Courses: