Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-913: Cloud Security Fundamentals
    • 05/27/2026 – 05/29/2026
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • RH-245: Linux System Administration I
    • 06/01/2026 – 06/05/2026
    • San Antonio
  • in   

    Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun.  When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks.  We then cable the switch to the Palo Alto Networks Firewall.  Each student gets their own Palo Alto Firewall Pod of hardware and software.  What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall.  The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services.  The Trust VLAN has Windows and Linux clients.  The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN.  All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.  

    After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment.  Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed.  Using packet captures, custom APP-ID's  and custom signatures are generated.  Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response.  It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment.  In the end we have a good understanding of the Palo Alto Networks Firewall.

    Course Description:

    Artificial Intelligence Essentials (AIE) is a foundational AI literacy certification that builds practical understanding of AI and responsible use

    The Artificial Intelligence Essentials (AIE) Course is designed to prepare learners for the newly Artificial Intelligence Essentials (AIE) exam. This hands-on program introduces professionals to core AI concepts, practical tools, and safe real-world applications. It equips learners to understand AI systems, use AI responsibly, and boost productivity across roles and industries

    Participants will gain knowledge in understanding how AI systems work, where they are used, how they influence decision-making, and how they should be applied responsibly in everyday, professional, and organizational contexts. The course covers what AI is and what it is not, how data and models drive AI behavior, and how modern AI systems differ from traditional software. Learners develop the ability to interact effectively with AI tools, evaluate AI outputs with informed judgment, and apply responsible practices aligned with privacy, security, and global regulatory expectations.

    By the end of the course, learners will be prepared to use AI confidently, safely, and productively while recognizing limitations, ethical risks, and broader societal impacts. It serves as a universal entry point before any technical, managerial, security, or governance specialization in AI.

    Course Outline: 

    01. Introduction to Artificial Intelligence

    02. Everyday AI Tools and Use Cases

    03. Building Blocks of AI

    04. Prompt Crafting AI-Driven Interactions

    05. AI Ethics and Responsible AI

    Dates/Locations:

    No Events

     

    Course Overview:

    PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.

    Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Packages and namespaces
    • References and scoping
    • Manipulating complex data structures
    • Object-oriented programming
    • Writing and using modules
    • Testing PERL code
    • Contributing to CPAN

    Prerequisites:

     

    Comments

    Latest comments from students


    User: J Masters

    Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.


     

    Liked the class?  Then let everyone know!

    Course Overview:

    Certified in Risk and Information Systems Control (CRISC), is for professionals responsible for an organization's risk management program.  Students looking to acquire CRISC qualify themselves as IT security analyst, security engineer architect, information assurance program manager and senior IT auditor.  CRISC certified professionals manage risk, design and oversee response measures, monitor systems for risk, and ensure the organization's risk management strategies are met.

    The CRISC exam will primarily align with the terminology and concepts described in The Risk IT Framework, The Risk IT Practioner Guide, and COBIT 5.  This will include applications in the evaluation and monitoring of IT-based risk, as well as the design and implementation of IS controls. 

    The CRISC exam covers four domains that are periodically updated to reflect the changing needs of the profession:

    • Domain 1: Risk Identification 
    • Domain 2: Risk Assessment
    • Domain 3: Risk Response and Mitigation
    • Domain 4: Risk and Control Monitoring and Reporting

    This course is designed to assist in your exam preparation for the CRISC exam.

    Attendees to TN-835: Certified in Risk and Information Systems Control (CRISC) Seminar will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Risk IT Framework—Purpose and Principles
    • Essentials of Risk Governance, Evaluation, and Response
    • Risk and Opportunity Management Using CobiT, Val IT and Risk IT
    • The Risk IT Framework Process Model Overview
    • Managing Risk in Practice—The Practitioner Guide Overview
    • Overview of the Risk IT Framework Process Model 
    • The Risk IT Framework

    Prerequisites:

    A minimum of at least three (3) years of cumulative work experience performing the tasks of a CRISC professional across at least three (3) CRISC domains is required for certification. There are no substitutions or experience waivers.

    Comments

    Latest comments from students


    User: tracycampbell

    Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

    Facilities comments: The Home2Suites by Hilton was FANTASTIC!



    Liked the class?  Then let everyone know!