Here are our Microsoft Programming courses:

Course Overview:
This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam from EC-Council.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council official iLabs code with access for 6 months
- EC-Council official Certificate of Attendance
- CEH Exam Voucher
Dates/Locations:
Date/Time | Event |
---|---|
02/24/2025 - 02/28/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
05/19/2025 - 05/23/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
08/11/2025 - 08/15/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
11/17/2025 - 11/21/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Introduction to Ethical Hacking
- Module 02. Foot-printing and Reconnaissance
- Module 03. Scanning Networks
- Module 04. Enumeration
- Module 05. Vulnerable Analysis
- Module 06. System Hacking
- Module 07. Malware Threats
- Module 08. Sniffing
- Module 09. Social Engineering
- Module 10. Denial-of-Service
- Module 11. Session Hijacking
- Module 12. Evading IDS,Firewalls, and Honeypots
- Module 13. Hacking Web Servers
- Module 14. Hacking Web Applications
- Module 15. SQL Injection
- Module 16. Hacking Wireless Networks
- Module 17. Hacking Mobile Platforms
- Module 18. IoT and OT Hacking
- Module 19. Cloud Computing
- Module 20. Cryptography
Prerequisites:
- Windows operating system and/or Linux operating system or other Unix-based OS
- TCP/IP protocols and implementation
- At least 2 years of IT security experience
- TN-325:Security+
Target Audience:
Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.
Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment. It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements. The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and 40% lab time.
Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Overview of Business Analysis Workshop
- Eliciting Project Workshop
- Case Study
- Analyzing Requirements and Writing Case Studies
- Case Study
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This comprehensive course provides you with an in-depth understanding of the current telecom landscape and how voice is migrating from a circuit- to a packet-switched network. You will learn how to evaluate existing technology options to determine which will best meet your organization's data and telephony requirements, from mature digital transport/access services to emerging voice and data services using voice over packet technologies.
Attendees to TN-245: Telecommunications Fundamentals will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 days
Course Objectives:
- The Current State of the Telecom Industry
- Telecom Service Providers
- Digitalizing Voice
- Communication Mediums and Multiplexing
- Carrier Access: Customer-to-Carrier Connections
- Broadband Access
- Enterprise Networks
- Carrier Transport Services
- Data Communications and Packet-Switched Networks
- Migrating Voice from Circuit-to-Packet-Switched Networks
- Carrier Data Services
- Ethernet Services
- Remote Access Virtual Private Networks (VPNs)
- Video Technology and Services
- Current Mobile Wireless Services
- Fixed Mobile Convergence (FMC)
- Worldwide Interoperability for Microwave Access (WiMax)
- Multimedia Subsystem (IMS)
Prerequisites:
- None
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
PA-222: Palo Alto Networks Panorama Essentials Training Class is a two-day course that teaches students to configure and manage the Palo Alto Networks Panorama management server. Through hands-on training, students learn high end skills of how to integrate Palo Alto Networks next-generation firewalls into their network infrastructure and manage them with Palo Alto Networks Panorama management server.This is not a virtualized theoretical course. This is hands-on, real world in the classroom instructor led with lab assistance, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls and their enterprise management.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, Cisco, Unix, and Windows certifications.
Attendees to the Palo Alto Networks Panorama Essentials Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration 2 days
Course Objectives:
Students attending this foundational-level training course will gain an in-depth knowledge of how to configure and manage their Palo Alto Networks Panorama management server, including hands-on experience in configuring the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System (PAN-OS) through Panorama.
|
|
Prerequisites:
- Security+, Network+, Palo Alto Networks Firewall Essentials FastTrack and networking experience is recommended.
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students