Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-215: Cloud+
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • TN-965 Windows Security Automation with Powershell
    • 01/05/2026 – 01/09/2026
    • San Antonio
  • TN-715: Systems Security Certified Practitioner (SSCP)
    • 01/12/2026 – 01/16/2026
    • San Antonio
  • AZ-900: Microsoft Azure Fundamentals
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • in   

    Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun.  When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks.  We then cable the switch to the Palo Alto Networks Firewall.  Each student gets their own Palo Alto Firewall Pod of hardware and software.  What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall.  The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services.  The Trust VLAN has Windows and Linux clients.  The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN.  All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.  

    After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment.  Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed.  Using packet captures, custom APP-ID's  and custom signatures are generated.  Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response.  It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment.  In the end we have a good understanding of the Palo Alto Networks Firewall.

     

    Course Overview:

    This course provides students with the knowledge and skills they need to develop C# applications for the Microsoft .NET Platform.  The course focuses on C# program structure, language syntax & implementation details.  C# was created to be the programming language best suited for writing enterprise applications for .NET. C# combines the high productivity of Microsoft Visual Basic with the raw power of C++.  It is a simple, object-oriented and type-safe programming language that is based on the C & C++ family of languages.

    Attendees to MS-2124: Programming with C# will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Overview of the Microsoft .NET Platform Overview of C#
    • Using Value-Type Variables
    • Statements & Exceptions
    • Methods & Parameters
    • Arrays
    • Essentials of Object-Oriented Programming
    • Using Reference-Type Variables
    • Creating & Destroying Objects
    • Inheritance in C#
    • Aggregation, Namespaces & Advanced Scope
    • Operators & Events Properties & Indexes
    • Attributes

    Prerequisites:

    • Experience with programming in C, C++, Visual Basic, Java or another programming language

     

    Comments

    Latest comments from students


    User: jdmccol

    Instructor comments: Excelent instructor, covered topic in depth and modified course objectives to meet student own needs.

    Facilities comments: Was OK, I am sure the Technow facilities when competed will be better.



     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    The HCISPP is the only certification that combines cybersecurity skills with privacy best practices and techniques. It demonstrates you have the knowledge and ability to implement, manage, and assess security and privacy controls to protect healthcare organizations using policies and procedures established by the cybersecurity experts at (ISC)2. TechNows HCISPP Certification Boot Camp is a comprehensive review of Healthcare cybersecurity with privacy best practices & industry best practices.

    Attendees to TN-8155: HCISPP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction..

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Strategically focus your preparation for HCISPP Certification
    • Cover a broad spectrum of topics in the 7 domains of the HCISPP Common Body of Knowledge (CBK)
    • Gain knowledge on the Healthcare industry including third party relationships and health data management concepts
    • Identify applicable regulations, compliance frameworks, privacy principles and policies to protect information security
    • Develop risk management methodology and identify control assessment procedures

    Audience:

    • The HCISPP certification is ideal for security professionals responsible for safeguarding protected health information (PHI). Take this HCISPP training course to prepare to manage and implement security controls for healthcare information. HCISPPs are instrumental to a variety of job functions: Compliance Officer, Information Security Manager, Privacy Officer, Compliance Auditor, Risk Analyst, Medical Records Supervisor, IT Manager, Privacy & Security Consultants, and Health Information Manager.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!