Course Overview:
This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years. This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux. RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course. The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux. The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.
Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
Day 1 and 2: Unix Review and Unix Utilities
- Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
- Linux File, Directory, and Permissions Management
- Linux archives using tar and zip
- Interacting with BASH
- Review of Common Linux commands
- Sorting files by line or field
- Regular Expressions (meta character) with grep commands to locate specific lines in files
- Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
- Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
- Miscellaneous commands Tr, sort, cut, past, pr -Lab
- Performing non-interactive editing tasks with the sed command
- Writing simple sed scripts to perform complex editing tasks
- Using awk variables & arrays to sort data
- Employing awk programs to manipulate numeric & textual data
- Performing formatted printing in awk
- Writing simple awk programs to write reports from data files
- Using built-in awk functions & defining new functions
- Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
- Shell Review
- Shell Interpretation of Quotes & Backslash
- The Bash Shell
- Shell's combined with UNIX utilities
- Programming Basics
- Data Constructs
- Programming Looping
- Your Environment
- More on Parameters
Day 4 and 5 – Security Fundamentals, Linux Administration
- System Configuration / Kernel overview
- System Maintenance / Disk and file admin
- Using utilities for process control, locating files & automating maintenance tasks
- System Startup / Boot Process – LILO & GRUB Configuration
- Managing the Linux file system
- Customization of setup files
- Run Levels
- Network Services / Configuration
- User Management Monitoring, accessing & restricting root system access
- Administration Tools
- Process Control
- Client side components of NFS, Samba, NTP, NIS
- Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.
Prerequisites:
- Prior UNIX/Linux experience or training
Comments
Latest comments from students
User: mikenaya
Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.
Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.
User: fquinene
Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.
Facilities comments: Facility was fine
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
CT-395: CompTIA CySA+ Cybersecurity Analyst is for IT professionals looking to gain IT security analyst skills, and for those following the recommended skills pathway to achieve cybersecurity mastery. It provides a bridge between CompTIA Security+ (CT-325) and CompTIA Advanced Security Practitioner (CASP,CT-425), thus completing a certification path within the CompTIA family of certifications. As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CySA+ applies behavioral analytics to the IT security market to improve the overall state of security. The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization. Let us help you bridge this gap, and leave you prepared for the certification exam (CS0-002).
TechNow is a CompTIA partner uses official CompTIA CySA+ curriculum.
Dates/Locations:
Date/Time | Event |
---|---|
09/08/2025 - 09/12/2025 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
12/01/2025 - 12/05/2025 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
Prerequisites:
While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CT-325: Security+ or equivalent experience. It is recommended for CompTIA CySA+ candidates to have the following:
- 3-4 years of hands-on information security or related experience
- Network+, Security+, or equivalent knowledge.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM. Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.
Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.
At the end of this course, you should understand the features and operations of View and be able to:
- Install and configure View components
- Create and manage dedicated and floating desktop pools
- Deploy and manage linked-clone virtual desktops
- Configure and manage desktops that run in local mode
- Configure secure access to desktops through a public network
- Use ThinApp to package applications
Date/Locations:
Duration: 5 days
Course Objectives:
- Module 1: Course Introduction
- Module 2: Introduction to VMware View
- Module 3: View Connection Server
- Module 4: View Desktops
- Module 5: View Client Options
- Module 6: View Administratory
- Module 7: Configuring and Managing Linked Clones
- Module 8: Local-Mode Desktops
- Module 9: Command-Line Tools and Backup Options
- Module 10: Managing VMware View Security
- Module 11: View Manager Performance and Scalability
- Module 12: VMware® ThinAppTM
Prerequisites:
- VM-315: VMware Infrastructure: Install, Configure and Manage
- Experience in Microsoft Windows Active Directory Administration
- Experience with VMware vSphereTM
- Before attending the course, students must be able to perform the following tasks:
- Create a template in VMware vCenterTM Server and deploy a virtual machine from it
- Modify a template customization file
- Open a virtual machine console in vCenter Server and access the guest operating system
- Configure Active Directory services
Comments
Latest comments from students