After you press "Request Information" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form

    Tech Now can provide on-site training anywhere in the world. We'll customize a training package to meet your needs!

    First Name*

    Last Name*

    Your Email*

    Your Company*

    Your State*

    Area of Interest

    Phone

    Questions:

    After you press "Request Information" on this form, within 30 seconds, status will be provided at the bottom of the form

    from page:

    in   

    Course Overview:

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

    Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Systems Security Engineering
    • Certification and Accreditation
    • Technical Management
    • U.S. Government Information Assurance Governance

    Prerequisites:

    Comments

    Latest comments from students


    User: fsarisen

    Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


    User: storoy30

    Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


    Liked the class?  Then let everyone know?

    TechNow Provides Integrated Solutions

    TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security.  If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.

    TechNow Virtualization Solutions:  TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware.  TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks.  High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure.  If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.

    TechNow VoIP Solutions:   TechNow  delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks.  There are many marketing terms for highly integrated solutions, the term our product is "Great".  If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.

    TechNow Security Solutions:   TechNow delivers security solutions that are enterprise centric.  As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement  hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.

    in   

    Course Overview:

    A skills focus enables the student to better absorb the subject matter and perform successfully on the exam.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.

    Attendees to TN-939:  Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 9 days

    Course Objectives:

    • Backdoors & Trojan Horses
    • Buffer Overflows
    • Covering Tracks: Networks
    • Covering Tracks: Systems
    • Denial of Service Attacks
    • Exploiting Systems Using Netcat
    • Format String Attacks
    • Incident Handling Overview and Preparation
    • Incident Handling Phase 2: Identification
    • Incident Handling Phase 3: Containment
    • Incident Handling: Recovering and Improving Capabilities
    • IP Address Spoofing
    • Network Sniffing
    • Password Attacks
    • Reconnaissance
    • Rootkits
    • Scanning: Host Discovery
    • Scanning: Network and Application Vulnerability scanning and tools
    • Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
    • Scanning: Service Discovery
    • Session Hijacking, Tools and Defenses
    • Types of Incidents
    • Virtual Machine Attacks
    • Web Application Attacks
    • Worms, Bots & Bot-Nets

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: m_jurrens

    Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.


    User: natebonds

    Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.

    Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.

    Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    07/27/2026 - 07/31/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX
    10/19/2026 - 10/23/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX

    Course Duration: 5 days

    Course Objectives:

    • Prepare to deploy cloud solutions
    • Deploy a pilot project
    • Test a pilot project deployment
    • Design a secure network for cloud deployment
    • Determine CPU and memory sizing for cloud deployments
    • Plan Identity and Access Management for cloud deployments
    • Analyze workload characteristics to ensure successful migration to the cloud
    • Secure systems to meet access requirements
    • Maintain cloud systems
    • Implement backup, restore, and business continuity measures
    • Analyze cloud systems for required performance
    • Analyze cloud systems for anomalies and growth forecasting
    • Troubleshoot deployment, capacity, automation, and orchestration issues
    • Troubleshoot connectivity issues
    • Troubleshoot security issues

    Course Prerequisites:

    • Security+, Network+, CASP or equivalent experience
    • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!