Here are the General Unix course offerings:
Welcome to TechNow! The Leader in Information Security Training & Computer Training.
The world of information security and computer training is ever changing. The techniques and systems continue to evolve and we must stay current and diligent. To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.
TechNow® has been training the leaders in the computer community for many years. We provide training for students in a number of areas. Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more. With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.
TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.
.

Course Overview:
Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Outline:
- Identity and access
- Configure Azure Active Directory for Azure workloads and subscriptions
- Configure Azure AD Privileged Identity Management
- Configure security for an Azure subscription
- Platform Protection
- Understand cloud security
- Build a network
- Secure network
- Implement host security
- Implement platform security
- Implement subscription security
- Security Operations
- Configure security services
- Configure security policies by using Azure Security Center
- Manage security alerts
- Respond to and remediate security issues
- Create security baselines
- Data and Applications
- Configure security policies to manage data
- Configure security for data infrastructure
- Configure encryption for data at rest
- Understand application security
- Implement security for application lifecycle
- Secure applications
- Configure and manage Azure Key Vault
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Students should have 1-2 years professional development experience and experience with Microsoft Azure.
- Student must be able to program in an Azure Supported Language.
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The C-215: Introduction to C Programming course is a hands-on course providing a complete introduction to the ANSI C programming language, focusing on quickly developing the practical skills needed to create real-world solutions. Our hands-on labs are designed to promote retention and challenge students to apply their skills to new situations.
Attendees to C-215: Introduction to C Programming will receive TechNow approved course materials and expert instruction.
Duration: 5 days
Course Objectives:
- What is C?
- Basics of Program Writing
- Style
- Basic Declarations & Expressions
- Arrays, Qualifiers & Reading Numbers
- Decision & Control Statements
- Programming Process
- More Controls Statements
- Variable Scope & Functions
- C Preprocessor
- Bit Operations
- Advanced Types
- Simple Pointers
- File Input/Output
- Debugging & Optimization
- Floating Point
Prerequisites:
Before attending this course, you should be able to use basic UNIX commands and have previous programming experience language, or have taken our Introduction to Computer Progamming class.
Comments
Latest comments from students
User: jangles1337
Instructor comments: Pretty knowledgeable on a number of things. Could have had a better in depth understanding of the material.
Facilities comments: Was a hotel so it was pretty noisy some times.
User: ldorsey
Instructor comments: Great guy full of knowledge
Liked the class? Then let everyone know!

Course Overview:
The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.
This course is designed to assist in your exam preparation for the CISM exam.
Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:
Date/Time | Event |
---|---|
11/17/2025 - 11/21/2025 08:00 -16:00 |
TN-825: Certified Information Security Manager (CISM) Seminar TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Information Security Governance (24%)
- Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
- Information Risk Management (30%)
- Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
- Information Security Program Development and Management (27%)
- Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
- Information Security Incident Management (19%)
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Prerequisites:
A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.
Comments
Latest comments from students
User: tracycampbell
Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.
Facilities comments: The Home2Suites by Hilton was FANTASTIC!
Liked the class? Then let everyone know!