Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Manage Identity
  • Plan Desktop and Device Deployment
  • Plan and Implement a Microsoft 365 Solution
  • Configure Networking
  • Configure Storage
  • Manage Data Access and Protection
  • Manage Remote Access
  • Manage Apps
  • Manage Updates and Recovery

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-210: Project+
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • N-305: CCNA Bootcamp
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • in   

    Course Overview:

    A skills focus enables the student to better absorb the subject matter and perform successfully on the exam.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.  Students then gain network experience and use sniffing to help exemplify the benefit of learning wired and wireless security configurations. The course concludes with exercising real attack strategies to demonstrate the techniques acquired throughout the course.

    Attendees to TN-939:  Hacker Techniques, Exploits, and Incident Handling will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 9 days

    Course Objectives:

    • Backdoors & Trojan Horses
    • Buffer Overflows
    • Covering Tracks: Networks
    • Covering Tracks: Systems
    • Denial of Service Attacks
    • Exploiting Systems Using Netcat
    • Format String Attacks
    • Incident Handling Overview and Preparation
    • Incident Handling Phase 2: Identification
    • Incident Handling Phase 3: Containment
    • Incident Handling: Recovering and Improving Capabilities
    • IP Address Spoofing
    • Network Sniffing
    • Password Attacks
    • Reconnaissance
    • Rootkits
    • Scanning: Host Discovery
    • Scanning: Network and Application Vulnerability scanning and tools
    • Scanning: Network Devices (Firewall rules determination, fragmentation, and IDS/IPS evasion)
    • Scanning: Service Discovery
    • Session Hijacking, Tools and Defenses
    • Types of Incidents
    • Virtual Machine Attacks
    • Web Application Attacks
    • Worms, Bots & Bot-Nets

    Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, Networking, and Security Experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    User: m_jurrens

    Instructor comments: Both instructors Mr. Askey and Mr. Hackney, were very good. the open learning environment was extremely productive and I felt we all learned far more that we ever would out of a structured rote memorization course.


    User: natebonds

    Instructor comments: Both Mr. Askey and Hackney were extremely knowledgeable. They were also extremely interested in helping each student learn. I was particularly impressed with the way they tailored the course to optimize our time since we weren't testing. I feel like I know much much more than I did when the class started.

    Facilities comments: The facilities were fine. I would have preferred it be closer to Lackland.


    Liked the class?  Then let everyone know!

     

    Course Overview:

    Every programmer must keep up with the latest tools and techniques. This course will help you push your skills to the next level and become a more accomplished programmer.  Advanced PERL Programming teaches you all the complex techniques for production-ready PERL programs and explains concepts such as introspection, overriding built-ins, extending PERL's OO model, and testing your code for greater stability.

    Attendees to P-415: Advanced PERL Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Advanced Techniques
    • Parsing Techniques
    • Templating Tools
    • Objects, Databases, and Applications
    • Natural Language Tools
    • PERL and Natural Languages
    • Handling English Text
    • Modules for Parsing English
    • Categorization and Extraction
    • PERL and Unicode
    • POE
    • Programming in an Event-Driven Environment
    • Testing
    • Keeping Tests and Code Together
    • Inline Extensions
    • Just Another PERL Hacker

    Prerequisites:

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!