TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

Here are courses about specilaized Software or Hardware:

in   

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-210: Project+
    • 10/27/2025 – 10/30/2025
    • San Antonio
  • CT-325: Security+
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 10/27/2025 – 10/31/2025
    • San Antonio
  • CT-215: Cloud+
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • TN-125: Introduction to UNIX and Linux
    • 11/03/2025 – 11/07/2025
    • San Antonio
  • in   

    Course Overview:

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

    Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Systems Security Engineering
    • Certification and Accreditation
    • Technical Management
    • U.S. Government Information Assurance Governance

    Prerequisites:

    Comments

    Latest comments from students


    User: fsarisen

    Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


    User: storoy30

    Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


    Liked the class?  Then let everyone know?

      

     

    Course Overview: PA-243: Palo Alto Networks Firewall Debug and Troubleshoot is a three-day course on how to troubleshoot the full line of Palo Alto Networks next-generation firewalls. Students will receive hands-on experience troubleshooting the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks PAN-OS® operating system. Upon completion of this class, students will have an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content. This is not a virtualized theoretical course.  This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.

    Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk.  Real hardware per student for real experience and real skill development.  TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.

    The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.

    Attendees to the PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311) Training Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 3 days

    Course Objectives:   Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks firewall, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS).

    Day 1

    • Module 0 – Introduction & Overview
    • Module 1: Troubleshooting
      • Methodology
    • Module 2: Platform
      • Comparisons When
      • Troubleshooting
    • Module 3: Flow Logic
    • Module 4: Administration
      • Troubleshooting

     

     

    Day 2

    • Mod 5: Layer 3
      • Troubleshooting
    • Mod 6: Policy
      • Troubleshooting
    • Mod 7: User-ID™
      • Troubleshooting

    Day 3

    • Mod 8: VPN
      • Troubleshooting
    • Mod 9: GlobalProtect™
      • Troubleshooting
    • Mod 10: Performance
      • Troubleshooting

     

    Prerequisites:

    This course is in no way associated with Palo Alto Networks, Inc.

    Comments

    Latest comments from students


    Like the class?  Then let everyone know!

    Course Overview:

    This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years.  This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux.  RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course.  The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux.  The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.

    Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    Day 1 and 2: Unix Review and Unix  Utilities

    • Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
    • Linux File, Directory, and Permissions Management
    • Linux  archives using tar and zip
    • Interacting with BASH
    • Review of Common Linux commands
    • Sorting files by line or field
    • Regular Expressions (meta character) with grep commands to locate specific lines in files
    • Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
    • Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
    • Miscellaneous commands Tr, sort, cut, past, pr -Lab
    • Performing non-interactive editing tasks with the sed command
    • Writing simple sed scripts to perform complex editing tasks
    • Using awk variables & arrays to sort data
    • Employing awk programs to manipulate numeric & textual data
    • Performing formatted printing in awk
    • Writing simple awk programs to write reports from data files
    • Using built-in awk functions & defining new functions
    • Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
     
    Day 3 – Intro to Programming / Shell Scripting
    • Shell Review
    • Shell Interpretation of Quotes & Backslash
    • The Bash Shell
    • Shell's combined with UNIX utilities
    • Programming Basics
    • Data Constructs
    • Programming Looping
    • Your Environment
    • More on Parameters

    Day 4 and 5 – Security Fundamentals, Linux Administration

    • System Configuration / Kernel overview 
    • System Maintenance / Disk and file admin
    • Using utilities for process control, locating files & automating maintenance tasks
    • System Startup / Boot Process – LILO & GRUB Configuration
    • Managing the Linux file system
    • Customization of setup files
    • Run Levels
    • Network Services / Configuration
    • User Management Monitoring, accessing & restricting root system access
    • Administration Tools
    • Process Control
    • Client side components of NFS, Samba, NTP, NIS
    • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.

    Prerequisites:

    • Prior UNIX/Linux experience or training

    Comments

    Latest comments from students


    User: mikenaya

    Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.

    Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.


    User: fquinene

    Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.

    Facilities comments: Facility was fine


    Liked the class?  Then let everyone know!