- TN-535: Certified Forensic Computer Examiner (CFCE)
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- N-305: CCNA Bootcamp
- PM-242: Defining Agile Requirements with User Stories
- PM-232: Product Owner and Scrum Master Roles in AGILE using SCRUM
- PM-222: Agile Principles using SCRUM Approach
- PM-221: Agile Overview for Executives and Leaders
- TN-430: Elasticsearch Engineer (ELK)
- TN-5455: Managing Windows Environments with Group Policy
- MS-5002: Introduction to SQL Databases
Course Overview:
Every programmer must keep up with the latest tools and techniques. This course will help you push your skills to the next level and become a more accomplished programmer. Advanced PERL Programming teaches you all the complex techniques for production-ready PERL programs and explains concepts such as introspection, overriding built-ins, extending PERL's OO model, and testing your code for greater stability.
Attendees to P-415: Advanced PERL Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Advanced Techniques
- Parsing Techniques
- Templating Tools
- Objects, Databases, and Applications
- Natural Language Tools
- PERL and Natural Languages
- Handling English Text
- Modules for Parsing English
- Categorization and Extraction
- PERL and Unicode
- POE
- Programming in an Event-Driven Environment
- Testing
- Keeping Tests and Code Together
- Inline Extensions
- Just Another PERL Hacker
Prerequisites:
- P-315: Intermediate PERL Programming or equivalent knowledge and skills
Comments
Latest comments from students
Liked the class? Then let everyone know!
We are often asked what is the recommended sequence of classes. Here is our recommended sequence of classes for The Security Field.
Certified Information Security Manager (CISM)
| CT-325 CompTIA Security+ | ![]() |
TN-825 Certified Information Security Manager |
Certified Information Systems Auditor(CISA)
| CT-325 CompTIA Security+ | ![]() |
TN-425 Certified Ethical Hacker | ![]() |
TN-822: Certified Information Systems Auditor (CISA) |
Certified Information Systems Security Professional(CISSP)
| CT-325 CompTIA Security+ | ![]() |
TN-425 Certified Ethical Hacker | ![]() |
TN-815 CISSP Certification Prep Seminar |
Course Overview:
Implementing Cisco IOS Network Security (IINS) is an instructor-led course. This five-day course focuses on the necessity of a comprehensive security policy and how it affects the posture of the network. TechNow students each get a Cisco Switch, Router, and an ASA. The in the classrom hardware hands-on component of this course is a priority. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure. TechNow is an Authorized VUE testing partner and this course concludes with the student taking the 210-260 IINS Cisco Certification Exam.
Course Objectives:
- Describe common network security concepts
- Secure routing and switching infrastructure
- Deploy basic authentication, authorization and accounting services
- Deploy basic firewalling services
- Deploy basic site-to-site and remote access VPN services
- Describe the use of more advanced security services such as intrusion protection, content security and identity management
Attendees to N-325: Implementing Cisco IOS Network Security will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TechNow Cloud Security Fundamentals addresses the loss of hands-on control of system, application, and data security in the Cloud computing environment. Security teams wrestle with the impact and liability of Cloud computing on an organization. This course enables the security team to assist in contract language and Service Level Agreements (SLAs) when utilizing Cloud Service Providers (CSPs).
Compliance and auditing are introduced with strategies for control verification and audit analysis in the CSP environment. Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between require a compliance strategy. Students will go in-depth into the architecture and infrastructure fundamentals for private, public, and hybrid clouds. Topics covered include: patch and configuration management, virtualization security, application security, and change management. Policy, risk assessment, and governance within cloud environments will be covered with recommendations for both internal policies and contract provisions to consider.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to effectively manage security in the cloud environment.
Attendees to TN-913: Cloud Security Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
02/09/2026 - 02/12/2026 08:00 -16:00 |
TN-913: Cloud Security Fundamentals TechNow, Inc, San Antonio TX |
|
05/26/2026 - 05/29/2026 08:00 -16:00 |
TN-913: Cloud Security Fundamentals TechNow, Inc, San Antonio TX |
|
09/08/2026 - 09/11/2026 08:00 -16:00 |
TN-913: Cloud Security Fundamentals TechNow, Inc, San Antonio TX |
|
12/07/2026 - 12/10/2026 08:00 -16:00 |
TN-913: Cloud Security Fundamentals TechNow, Inc, San Antonio TX |
Course Duration: 3 days
Course Objectives:
- Cloud computing introduction
- Security challenges in the cloud
- Infrastructure security in the cloud
- Policy, risk, and governance for cloud computing
- Compliance and legal considerations
- Audit and assessment for the cloud
- Data security in the cloud
- Identity and Access Management (IAM)
- Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
- Intrusion detection and incident response
Course Prerequisites:
- GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
User: reedrobt
Instructor comments: Dave is like an encyclopedia of technical topics...what "doesn't" he have expertise in?
Facilities comments: Home2 location was well-kept and convenient to other services.
