Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-210: Project+
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • N-305: CCNA Bootcamp
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • in   

      After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

      Scroll down to see the course description.

      First Name*

      Last Name*

      Your Email*

      Your Organization*

      Phone*

      Questions:

      After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

      Windows Security Automation and Threat Hunting with PowerShell Seminar

      Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

      Date: October 10, 2018 8:00am – 4:00pm

      Duration: 8 hours

      Audience: Cyber Security professionals and Windows administrators

      Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

      Description:
      PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

      Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

      Objectives:

      PowerShell Overview

      • Getting started running commands
      • Security cmdlets
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.

      PowerShell Utilities and Tips

      • Customizing your profile script
      • PowerShell remote command execution
      • Security setting across the network
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Parsing Security Logs
      • Searching remote event logs
      • Mounting the registry as a drive
      • Security settings in the Registry
      • Exporting data to CSV, HTML and JSON files
      • Running scripts as scheduled jobs
      • Continued Security Compliance
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

      PowerShell Scripting

      • PowerShell Scripting to implement Security Practices
      • Writing your own functions to automate security status and settings
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, foreach, that make security decisions
      • How to pipe data in/out of your scripts for security compliance and reporting

      Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

       

      Course Overview:

      TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

      TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

      This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

      Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

      Date/Locations:

      No Events

      Course Duration: 5 days

      Course Objectives:

      • Learn to comprehend and develop complex scenarios
      • Identify and create intelligence requirements through practices such as threat modeling
      • Utilize threat modeling to drive intelligence handling and practices 
      • Breakdown tactical, operational, and strategic-level threat intelligence
      • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
      • How to collect adversary information creating better value CTI
      • How to filter and qualify external sources, mitigating low integrity intelligence
      • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
      • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
      • Breaking down threats mapped against their tradecraft to tweak IOCs
      • Establish structured analytical techniques to be successful in any security role
      • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

      Course Prerequisites:

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

       

      Course Overview:

      This hands-on course provides an intensive overview of fundamental UNIX commands that are common to all flavors of UNIX, but the focus is on RedHat. At the end of this course students will have a firm grasp of how the UNIX operating system works, how to accomplish powerful functions using multiple commands & most importantly of all, how to think UNIX. With the skills gained in this course, students can move on to RedHat System Administration I or Linux System Admnistration I.

      Attendees of TN-125: Introduction to UNIX and Linux will receive course materials and expert Instruction.

      Date/Locations:

      Date/Time Event
      04/20/2026 - 04/24/2026
      08:00 -16:00
      TN-125: Introduction to UNIX and Linux
      TechNow, Inc, San Antonio TX
      07/13/2026 - 07/17/2026
      08:00 -16:00
      TN-125: Introduction to UNIX and Linux
      TechNow, Inc, San Antonio TX
      10/19/2026 - 10/23/2026
      08:00 -16:00
      TN-125: Introduction to UNIX and Linux
      TechNow, Inc, San Antonio TX

      Duration: 5 days

      Course Objectives:

      • Unix Overview
      • Introduction to the UNIX command Line
      • Managing and controlling access to files
      • Batch Scripting and tools
      • Regular Expressions, Pipelines, and IO Redirection
      • Text File Manipulation
      • Basic Network Commands
      • Managing Unix Processes
      • GNOME Graphical Desktop

      Prerequisites:

      • Basic Knowledge of Computers

      Comments

      Latest comments from students



      User: trkdashin

      Instructor comments: Very knowledgeable

      Facilities comments: Nice Hotel


       

      Liked the class?  Then let everyone know!

       
       

      Course Overview:

       

      Install, configure, and manage Red Hat JBoss Enterprise Application Platform

      Red Hat JBoss® Application Administration I teaches you the best practices for installing and configuring Red Hat JBoss Enterprise Application Platform 6. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively deploy and manage applications on JBoss Enterprise Application Platform.

      Attendees to RH-345: Red Hat JBoss Application Administration I, will receive TechNow approved course materials and expert instruction.

      Dates/Locations:

      Duration: 5 Days

      Course Objectives:

      • Overview of JBoss Enterprise Application Platform
      • Configure JBoss Enterprise Application Platform in standalone mode
      • Configure JBoss Enterprise Application Platform in domain mode
      • Configure servers
      • Use the CLI tool
      • The datasource subsystem
      • The logging subsystem
      • The messaging subsystem
      • The security subsystem
      • JVM configuration
      • Migrating applications to JBoss Enterprise Application Platform 6
      • The web subsystem

      Prerequisites:

      • Linux System Administration

      Comments

      Latest comments from students


       

        

      Liked the class?  Then let everyone know!