TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:
Course Overview:
In this course students will learn to configure the Linux kernel, install & configure modules, to install and configure non-default devices and automate installation with Kickstart. Students also utilize skills developed in L-245 to expand on file system configuration with spanning devices and RAID. This is the foremost server side Linux course in the industry covering all server side components such as DHCP, Samba, NIS, LDAP, inet, telnet ftp, dns, etc. Expanding on security introduced in L-245: Linux System Administration I, TCP wrappers, firewalling with IP filters, SQUID, & ssh are covered.
Attendees to L-295: Linux System Administration II will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Custom installation of a Linux server
- Linux device naming conventions & the boot process
- Adding peripheral devices
- Reconfiguring the kernel
- Disk partitioning & formatting
- Changing system run levels
- Adding startup files for additional services
- Adding & removing software packages
- Disk & file system Administration
- Terminals & modem configuration
- Configuring NFS to support the client/server environment
- Use the automounter
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
- Troubleshooting techniques
- Advanced Linux installation
Prerequisites:
- L-245: Linux System Administration I plus six months experience as a systems administrator or one year or more of administrating the Linux operating system.
Comments
Latest comments from students
Liked the class? Then let everyone know!
DoD 8570 Training
The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.
DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required. Your DoD 8570 training ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.
Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.
Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:

Note: The Certifications in red are recently added to approved list as of 2/4/19
For further information or to schedule for classes, call us at 800-324-2294
Course Overview:
This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 days
Course Objectives:
- Information Security and Open Source Software
- Operating System Tools
- Firewalls
- Scanners
- Vulnerability Scanners
- Network Sniffers
- Intrusion Detection Systems
- Analysis and Management Tools
- Encryption Tools
- Wireless Tools
- Forensic Tools
- More on Open Source Software
Prerequisites:
- Experience in IT Security
- Solid basic knowledge of networks and TCP/IP
- Experience in command line under Linux and Windows is required
Comments
Latest comments from students
Liked the class? Then let everyone know!

CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
- Apply AI concepts to strengthen your organization’s cybersecurity posture
- Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
- Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
- Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
- Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
- Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
- Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
- Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
- Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
- Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
- Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
- Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
- Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
- Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
- Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
- Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
- Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
- Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.