Course Overview:

This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.

Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
04/06/2026 - 04/10/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX
07/27/2026 - 07/31/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX
10/19/2026 - 10/23/2026
08:00 -16:00
CT-215: Cloud+
TechNow, Inc, San Antonio TX

Course Duration: 5 days

Course Objectives:

  • Prepare to deploy cloud solutions
  • Deploy a pilot project
  • Test a pilot project deployment
  • Design a secure network for cloud deployment
  • Determine CPU and memory sizing for cloud deployments
  • Plan Identity and Access Management for cloud deployments
  • Analyze workload characteristics to ensure successful migration to the cloud
  • Secure systems to meet access requirements
  • Maintain cloud systems
  • Implement backup, restore, and business continuity measures
  • Analyze cloud systems for required performance
  • Analyze cloud systems for anomalies and growth forecasting
  • Troubleshoot deployment, capacity, automation, and orchestration issues
  • Troubleshoot connectivity issues
  • Troubleshoot security issues

Course Prerequisites:

  • Security+, Network+, CASP or equivalent experience
  • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview: 

This class uses a sample product development initiative to illustrate the course principles.  If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course will cover the Agile adaptive life cycle framework and all of the ceremonies, artifacts, and roles.

Attendees to PM-222: Agile Principles using will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Compare the Agile (adaptive) and Plan Driven (predictive/ waterfall) approaches
  • Understand the Agile Manifesto and SCRUM Framework
  • Apply the basics of Agile / SCRUM Team Organization, with importance of the Development Team responsibilities
  • Use Agile / SCRUM chartering, high-level estimating, and prioritization techniques to initiate a Product Roadmap and a Product Backlog
  • Create personas and user stories to lead to Development Team task assignments
  • Understand Release and Sprint Planning to lead to the Sprint Backlog
  • Plan and conduct a sample SCRUM Sprint from the Vision Statement through the Sprint retrospective

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

SharePoint is the Premier Office Collaboration Server Suite.  Two of the most requested features to implement in any SharePoint Server environment is building custom workflows and incorporating InfoPath forms into the site.  This course aims to build the average user’s body of knowledge and skill set to allow them to take on some of this responsibility.  Students will learn the SharePoint Designer software, a free product, to do these tasks.

Over the course of the two days the users will work on a live SharePoint Server environments making changes to pages, adding pages and making Workflows.  They will learn how to build InfoPath forms and migrate them to the SharePoint environment.

Attendees to TN-5202: Microsoft SharePoint 2010/2013: Workflows and Designing InfoPath Forms will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 2 days

Course Objectives:

  • Identify the basic features of the SharePoint Designer environment.
  • Create a new subsite.
  • Add content to a web page.
  • Use Cascading Style Sheets to format a SharePoint site.
  • Link web pages.
  • Add SharePoint components to the site.
  • Automate business processes with workflows.
  • Create InfoPath forms.
  • Import and export forms.
  • Customize a form layout.
  • Distribute forms.
  • Work with a database.

Prerequisites:

  • Knowledge of HTML not required, but helpful
  • Basic Computer Skills

Comments

Latest comments from students


User: golf123

Instructor comments: Mr. Moore knew and presented the course very well. I would definitely take future courses with TechNow.



Liked the class?  Then let everyone know!

TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.

Course Overview:

A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

What’s Included:

    • EC-Council official E-Courseware
    • EC-Council official Certificate of Attendance
    • EC-Council iLabs with access for 6 months
    • EC-Council CPENT Range access
    • CEH Exam Voucher

     

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Content:

      • Module 01. Introduction to Penetration Testing
      • Module 02. Penetration Testing Scoping and Engagement
      • Module 03. Open Source Intelligence (OSINT)
      • Module 04. Social Engineering Penetration Testing
      • Module 05. Network Penetration Testing – External
      • Module 06. Network Penetration Testing – Internal
      • Module 07. Network Penetration Testing – Perimeter Devices
      • Module 08. Web Application Penetration Testing
      • Module 09. Wireless Penetration Testing
      • Module 10. IoT Penetration Testing
      • Module 11. OT/SCADA Penetration Testing
      • Module 12. Cloud Penetration Testing
      • Module 13. Binary Analysis and Exploitation
      • Module 14. Report Writing and Post Testing Actions

     

    Prerequisites:

        • Pass the CEH exam
        • Pass the CND exam

    Target Audience:

    Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!