Here are the General Unix course offerings:
Course Overview:
This course, TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs), covers the two main objectives for those entering the wireless world, understanding the technology & addressing its security. TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) takes advantage of the student’s existing expertise to provide a challenging introductory course. Covering a broad range of wireless networking topics & an introduction on how to secure a wireless LAN from hackers. To insure wireless availability you need to understand proper design choices & administration practices. To protect valuable information on your network you need to know how attacks occur & techniques used to secure your wireless network.
Attendees to TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Radio Frequency (RF) Fundamentals
- Spread Spectrum Technologies
- 802.11 Network Architecture
- Physical & MAC Layers
- Hardware Installation, Configuration, & Management
- Antennas & Accessories
- Wireless Network Management
- Troubleshooting Wireless LANs
- Site Surveying
- Wireless LAN Security
- Organizations & Standards
Prerequisites:
Attendees should have network administration skills. These skills can be obtained through TechNow’s N-205 & N-305: CCNA/ICND Training program or our highly respected cross platform TN-385: TCP/IP Analysis & Implementation course.
Comments
Latest comments from students
User: TMPRIESTLEY
Instructor comments: The instructor was very well versed on the topic and knew how to apply it to real-life examples. He led the labs and was very excited about the topic which kept the interest of myself and other class members. Sometimes his volume level was a little high- however the room the class was in was very small. Too small for a big personality!
Facilities comments: I was unaware of the facility changes, but that was at no fault of anyone since I was a drop-in for the course. They were very helpful and quick to mediate the issue.
Liked the class? Then let everyone know!
(ISC)², CBK, and CISSP are registered marks of the International Information Systems Security Certification Consortium in the United States and other countries.
Access, Excel, Hyper-V, Outlook, Microsoft, SharePoint, Silverlight, SQL Server, Visual Basic, Win32, Windows, Windows PowerShell and Windows Server are registered trademarks of Microsoft Corporation.
Adobe, Acrobat, Flash and Photoshop are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries
Amazon Web Services is a trademark of Amazon.com, Inc.
Android is a trademark of Google Inc.
APMG-International Change Management, The APMG-International Change Management and Swirl Device logo, APMG-International AgilePM and The APMG-International AgilePM and Swirl Device logo are trademarks of The APM Group Limited.
Certified Ethical Hacker (CEH) is a registered trademark of EC-Council.
Cisco is a registered trademark of Cisco Systems Inc.
CMMI® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
CAPM, Certified Associate in Project Management (CAPM), PMP, Project Management Professional (PMP), PMI-ACP, PMI Agile Certified Practitioner (PMI-ACP), PMBOK, and the R.E.P. Logo are marks of Project Management Institute, Inc.
CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
Certified Business Analysis Professional, Certification of Competency in Business Analysis, Endorsed Education Provider, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.
COBIT is a trademark of ISACA, registered in the U.S. and other countries.
COBIT® 5 is a trademark of the Information Systems Audit and Control Association® (ISACA®). This product includes COBIT® 5, used by permission of ISACA®. 2012© ISACA®. All rights reserved.
CompTIA A+ and CompTIA Network+ are registered trademarks of the Computing Technology Industry Association, Inc.
CompTIA CASP and CompTIA Cloud Essentials are trademarks of the Computing Technology Industry Association, Inc.
GIAC and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
Hadoop is a registered trademark of the Apache Software Foundation.
Hibernate is a registered trademark and servicemark of Red Hat, Inc.
iPad, iPhone, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
ITIL®, PRINCE2® and MSP® are registered trademarks of AXELOS Limited.
JavaScript, JavaServer, JavaServer Pages, Enterprise JavaBeans, MySQL and PL/SQL are trademarks of Oracle Corporation.
Linux is a registered trademark of Linus Torvalds.
Java and Oracle are registered trademarks of Oracle Corporation.
Palo Alto Networks, PAN-OS, App-ID, Content-ID, Url-ID, GlobalProtect, Wildfire, and Panorama are trademarks of Palo Alto Networks, Inc.
"Python" is a registered trademark of the Python Software Foundation, used by Learning Tree International with permission from the Foundation.
Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries.
Red Hat Middleware, LLC. All rights reserved.
SANS and associated certifications: GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute
SAP Crystal Reports is the registered trademark of SAP AG in Germany and in several other countries.
Scrum Alliance REPSM is a service mark of Scrum Alliance, Inc. Any unauthorized use is strictly prohibited.
TechNow® is a registered trademark of TechNow Incorporated.
The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved.
The Swirl logo™ is a trademark of AXELOS Limited.
Transact-SQL is a trademark of Sybase, Inc.
UNIX is a registered trademark of The Open Group.
VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
XML is a trademark of MIT, INRIA or Keio on behalf of the World Wide Web Consortium.
TechNow provides an array of courses to meet our customer's requirements. Courses that do not fit into our major course categories and custom or specialized courses appear here.
Here are courses about specilaized Software or Hardware:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
- N-495: Voice-over IP (VoIP) Foundations
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
- RH-345: Red Hat JBoss Application Administration I
- TN-102: Writing Effective Requirements
- TN-205: A+ Skills Class
- TN-225: Network+ Skills Class
- TN-245: Telecommunications Fundamentals
- TN-395: Internet Protocol Version 6 (IPv6)
- TN-430: Elasticsearch Engineer (ELK)
- TN-801: Windows for Security Professionals
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-963: Windows Security Automation with PowerShell
- VM-315: VMware Infrastructure: Install, Configure, and Manage
- VM-325: VMware View: Install, Configure and Manage
Course Overview:
CT-395: CompTIA CySA+ Cybersecurity Analyst is for IT professionals looking to gain IT security analyst skills, and for those following the recommended skills pathway to achieve cybersecurity mastery. It provides a bridge between CompTIA Security+ (CT-325) and CompTIA Advanced Security Practitioner (CASP,CT-425), thus completing a certification path within the CompTIA family of certifications. As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CySA+ applies behavioral analytics to the IT security market to improve the overall state of security. The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization. Let us help you bridge this gap, and leave you prepared for the certification exam (CS0-002).
TechNow is a CompTIA partner uses official CompTIA CySA+ curriculum.
Dates/Locations:
Date/Time | Event |
---|---|
03/03/2025 - 03/07/2025 09:00 -17:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
06/02/2025 - 06/06/2025 09:00 -17:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
09/08/2025 - 09/12/2025 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
12/01/2025 - 12/05/2025 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
Prerequisites:
While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CT-325: Security+ or equivalent experience. It is recommended for CompTIA CySA+ candidates to have the following:
- 3-4 years of hands-on information security or related experience
- Network+, Security+, or equivalent knowledge.
Comments
Latest comments from students