Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM. Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.
Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.
At the end of this course, you should understand the features and operations of View and be able to:
- Install and configure View components
- Create and manage dedicated and floating desktop pools
- Deploy and manage linked-clone virtual desktops
- Configure and manage desktops that run in local mode
- Configure secure access to desktops through a public network
- Use ThinApp to package applications
Date/Locations:
Duration: 5 days
Course Objectives:
- Module 1: Course Introduction
- Module 2: Introduction to VMware View
- Module 3: View Connection Server
- Module 4: View Desktops
- Module 5: View Client Options
- Module 6: View Administratory
- Module 7: Configuring and Managing Linked Clones
- Module 8: Local-Mode Desktops
- Module 9: Command-Line Tools and Backup Options
- Module 10: Managing VMware View Security
- Module 11: View Manager Performance and Scalability
- Module 12: VMware® ThinAppTM
Prerequisites:
- VM-315: VMware Infrastructure: Install, Configure and Manage
- Experience in Microsoft Windows Active Directory Administration
- Experience with VMware vSphereTM
- Before attending the course, students must be able to perform the following tasks:
- Create a template in VMware vCenterTM Server and deploy a virtual machine from it
- Modify a template customization file
- Open a virtual machine console in vCenter Server and access the guest operating system
- Configure Active Directory services
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course, TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs), covers the two main objectives for those entering the wireless world, understanding the technology & addressing its security. TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) takes advantage of the student’s existing expertise to provide a challenging introductory course. Covering a broad range of wireless networking topics & an introduction on how to secure a wireless LAN from hackers. To insure wireless availability you need to understand proper design choices & administration practices. To protect valuable information on your network you need to know how attacks occur & techniques used to secure your wireless network.
Attendees to TN-305: Designing, Implementing, Administering and Securing Wireless Local Area Networks (LANs) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Radio Frequency (RF) Fundamentals
- Spread Spectrum Technologies
- 802.11 Network Architecture
- Physical & MAC Layers
- Hardware Installation, Configuration, & Management
- Antennas & Accessories
- Wireless Network Management
- Troubleshooting Wireless LANs
- Site Surveying
- Wireless LAN Security
- Organizations & Standards
Prerequisites:
Attendees should have network administration skills. These skills can be obtained through TechNow’s N-205 & N-305: CCNA/ICND Training program or our highly respected cross platform TN-385: TCP/IP Analysis & Implementation course.
Comments
Latest comments from students
User: TMPRIESTLEY
Instructor comments: The instructor was very well versed on the topic and knew how to apply it to real-life examples. He led the labs and was very excited about the topic which kept the interest of myself and other class members. Sometimes his volume level was a little high- however the room the class was in was very small. Too small for a big personality!
Facilities comments: I was unaware of the facility changes, but that was at no fault of anyone since I was a drop-in for the course. They were very helpful and quick to mediate the issue.
Liked the class? Then let everyone know!

Course Overview:
This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam from EC-Council.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council official iLabs code with access for 6 months
- EC-Council official Certificate of Attendance
- CEH Exam Voucher
Dates/Locations:
Date/Time | Event |
---|---|
08/11/2025 - 08/15/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
11/17/2025 - 11/21/2025 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Introduction to Ethical Hacking
- Module 02. Foot-printing and Reconnaissance
- Module 03. Scanning Networks
- Module 04. Enumeration
- Module 05. Vulnerable Analysis
- Module 06. System Hacking
- Module 07. Malware Threats
- Module 08. Sniffing
- Module 09. Social Engineering
- Module 10. Denial-of-Service
- Module 11. Session Hijacking
- Module 12. Evading IDS,Firewalls, and Honeypots
- Module 13. Hacking Web Servers
- Module 14. Hacking Web Applications
- Module 15. SQL Injection
- Module 16. Hacking Wireless Networks
- Module 17. Hacking Mobile Platforms
- Module 18. IoT and OT Hacking
- Module 19. Cloud Computing
- Module 20. Cryptography
Prerequisites:
- Windows operating system and/or Linux operating system or other Unix-based OS
- TCP/IP protocols and implementation
- At least 2 years of IT security experience
- TN-325:Security+
Target Audience:
Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.
Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview: PA-242: Palo Alto Networks Firewall Manage Cyberthreats (EDU-231) Training Class is a two-day course that teaches students strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. This is not a virtualized theoretical course. This is hands-on, real world instruction, directly relevant to the DoD and Commercial implementations of Palo Alto Networks next-generation firewalls.
Each student is issued a physical Palo Alto firewall and a Cisco layer 3 switch at their desk. Real hardware per student for real experience and real skill development. TechNow provides a very comprehensive client infrastructure that includes Windows, Linux, and multiple packet sniffer agents.
The instructor for this course has been a lead in Unix kernel development to implement firewall and intrusion detection technologies. Additionally, the instructor has taught several security appliance products and carries several SANS, ISC2, ISACA, Cisco, Unix, and Windows certifications.
Attendees to the PA-242: Palo Alto Networks Firewall Manaage Cyberthreats (EDU-231) Training Course will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 2 days
Course Objectives: Students attending this training course will gain an understanding of cyberthreats and their characteristics. Students will learn how to manage cyberthreats using security policies, profiles, and signatures to protect their network against emerging threats.
Day 1
|
Day 2
A |
Prerequisites:
- Students must complete the PA-213: Install, Configure, and Manage course
- Understanding of network concepts, including routing, switching, and IP addressing
- In-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering
This course is in no way associated with Palo Alto Networks, Inc.
Comments
Latest comments from students