Here are our Microsoft Programming courses:
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
CCFE Core Competencies
- Procedures and Legal Issues
- Computer Fundamentals
- Partitioning Schemes
- Data Recovery
- Windows File Systems
- Windows Artifacts
- Report writing (Presentation of Finding)
- Procedures and Legal issues
- Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
- Ability to explain the on-scene action taken for evidence preservation.
- Ability to maintain and document an environment consolidating the computer forensics.
- Computer Fundamentals
- Understand BIOS
- Computer hardware
- Understanding of numbering system (Binary, hexadecimal, bits, bytes).
- Knowledge of sectors, clusters, files.
- Understanding of logical and physical files.
- Understanding of logical and physical drives.
- Partitioning schemes
- Identification of current partitioning schemes.
- Understanding of primary and extended partition.
- Knowledge of partitioning schemes and structures and system used by it.
- Knowledge of GUID and its application.
- Windows file system
- Understanding of concepts of files.
- Understanding of FAT tables, root directory, subdirectory along with how they store data.
- Identification, examination, analyzation of NTFS master file table.
- Understanding of $MFT structure and how they store data.
- Understanding of Standard information, Filename, and data attributes.
- Data Recovery
- Ability to validate forensic hardware, software, examination procedures.
- Email headers understanding.
- Ability to generate and validate forensically sterile media.
- Ability to generate and validate a forensic image of media.
- Understand hashing and hash sets.
- Understand file headers.
- Ability to extract file metadata from common file types.
- Understanding of file fragmentation.
- Ability to extract component files from compound files.
- Knowledge of encrypted files and strategies for recovery.
- Knowledge of Internet browser artifacts.
- Knowledge of search strategies for examining electronic
- Windows Artifacts
- Understanding the purpose and structure of component files that create the windows registry.
- Identify and capability to extract the relevant data from the dead registry.
- Understand the importance of restore points and volume shadow copy services.
- Knowledge of the locations of common Windows artifacts.
- Ability to analyze recycle bin.
- Ability to analyze link files.
- Analyzing of logs
- Extract and view windows logs
- Ability to locate, mount and examine VHD files.
- Understand the Windows swap and hibernation files.
- Report Writing (Presentation of findings)
- Ability to conclude things strongly based on examination observations.
- Able to report findings using industry standard technically accurate terminologies.
- Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
- Be able to consider legal boundaries when undertaking a forensic examination
Course Overview:
This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.
Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
01/26/2026 - 01/30/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
04/20/2026 - 04/24/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
07/13/2026 - 07/17/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
|
10/19/2026 - 10/23/2026 08:00 -16:00 |
TN-125: Introduction to UNIX and Linux TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Unix Overview
- Introduction to the UNIX command Line
- Managing and controlling access to files
- Batch Scripting and tools
- Regular Expressions, Pipelines, and IO Redirection
- Text File Manipulation
- Basic Network Commands
- Managing Unix Processes
- GNOME Graphical Desktop
Prerequisites:
- Basic Knowledge of Computers
Comments
Latest comments from students
User: trkdashin
Instructor comments: Very knowledgeable
Facilities comments: Nice Hotel
Liked the class? Then let everyone know!
Course Overview:
The System Administration I for Red Hat course is designed for IT professionals working to become full-time enterprise Linux system administrators. This course gives the student direct experience with the most essential system administration tasks in the Red Hat. You will be instructed in crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local disk devices, installation, package management, performing system boot procedures, grub and controlling system processes.
Attendees to RH-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/02/2026 - 03/06/2026 08:00 -16:00 |
RH-245: Linux System Administration I TechNow, Inc, San Antonio TX |
|
06/01/2026 - 06/05/2026 08:00 -16:00 |
RH-245: Linux System Administration I TechNow, Inc, San Antonio TX |
|
09/14/2026 - 09/18/2026 08:00 -16:00 |
RH-245: Linux System Administration I TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Installation
- Manage File Systems and Local Disk Drives
- Perform Mounts and Unmounts
- Perform System Boot Procedures
- Tuning and Maintaining the Kernel
- Control System Processes
- Perform User Administration
- Installing and Managing Services
- Perform Package Administration
- Client Setup of SSH and Printing
Prerequisites:
Comments
Latest comments from students
User: mlspence
Instructor comments: Bill was awesome! He did a fantastic job teaching the course mater to everyone in the class. He made sure everyone was able to keep up and that they understood the material before moving on. Thanks!
Facilities comments: They were great as well
Liked the class? Then let everyone know!