This is an advanced course that assumes the attendee is a qualified security professional with experience using security tools and understands the concepts behind penetration testing. Courses that build up the expertise that enables a student to succeed in this course is Security+, CEH, CISSP, and any of the GIAC certifications. This course is completely hands-on and utilizes the BackTrack tool suite from backtrack-linux.org. The course covers, in detail, various attacks and tools that are contained in the BackTrack tool suite.
Attendees to TN-335: Advanced Penetration Testing Using Open Source Tools will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
Information Security and Open Source Software
Operating System Tools
Firewalls
Scanners
Vulnerability Scanners
Network Sniffers
Intrusion Detection Systems
Analysis and Management Tools
Encryption Tools
Wireless Tools
Forensic Tools
More on Open Source Software
Prerequisites:
Experience in IT Security
Solid basic knowledge of networks and TCP/IP
Experience in command line under Linux and Windows is required
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.
In this course-currently the only offering in the market devoted to Group Policy training-you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.
Attendees to TN-5455: Managing Windows Environments with Group Policy will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
Features and functions of Group Policy
Use Group Policy management tools to manage security policies
Design a Group Policy infrastructure
Group Policy processing architecture
Back up, restore, import, and copy Group Policy Objects through the Group Policy
Management Console
Use Windows PowerShell to manage Group Policy
Implement security using Group Policy
Configure the desktop environment with Group Policy
Configure roaming profiles and Folder Redirection
Assign and publish software packages
Implement AppLocker and software restriction policies
Create and deploy Administrative Templates
Configure Group Policy preferences
Course Prerequisites:
Experience with the Microsoft Windows Server 2008/12 environments and a fundamental understanding of Active Directory
TechNow has been involved in enterprise security architectures and education since 1990. TechNow’s training program has followed the evolution of enterprise computing into security architectures. Palo Alto Networks represents the current state of security product evolution. With next generation firewall technology, the reunification of your security architecture is possible. TechNow can present the ramifications of many centralized strategies. All courses utilize enterprise security professionals with experience as instructors and can discuss the detail of implementation and the integration into an existing infrastructure.
TechNow is a mobile Pearson VUE Authorized Testing Center. Palo Alto courses can be delivered on the customer site, with certificadtion testing on the last day of the course. Take the course and get certfied, without logistical effort of getting students to a training facility and the hassle of scheduling testing.
ITIL Version 4 is divided into 5 areas: Continual Service Improvement; Service Strategy; Service Design; Service Transition; and Service Operation. These 5 areas support the overall focus of ITIL’s service management through the Service Life cycle. IT-113: IT Infrastructure LIbrary (ITIL)- Foundations Course provides a detailed introduction of terms, definitions, benefits, and relationships of the following function and processes as well as roles and responsibilities that supports them.
Attendees to IT-113: IT Infrastructure Library (ITIL) – Foundations Course will receive TechNow approved course materials and expert instruction.