Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-825: Certified Information Security Manager (CISM) Seminar
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • in   

    Course Overview:

    As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications.  In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP.   Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations.  Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny.  Other protocols such as Nortel's UNIStim will be addressed.  As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures.   Various open source tools including those in BackTrack are used for VoIP attacks.  A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.

    Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • VoIP Architecture
    • VoIP Signaling and media protocols
    • Common VoIP authentication mechanisms
    • Common VoIP encryption techniques
    • VoIP protocol analysis with Wireshark
    • Maintaining QoS while mitigating DoS
    • VoXML, XML, and application integration security
    • Converged network security design and implementation
    • Impact of NAT and firewalls
    • SIP, H.323, and MGCP vulnerabilities
    • VPN, IPsec and SRTP to secure VoIP services
    • Penetration testing with open source tools
    • Attacks for Eavesdropping, call redirection, and DoS
    • Design of hacked firmware virtualization layer
    • Concise lockdown steps for network hardware and VoIP

    Prerequisites:

    • This is an advanced Information Security Course which requires basic Windows & UNIX competency
    • Certification or 2 years of experience in these operating systems is highly recommended
    • As well as an understanding of TCP/IP

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    PP-244: CIPM + CIPP/E 4 Day GDPR Ready

     

    Course Overview:

    A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.

    With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.

    The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education. 

    What’s Included:

    • Authorized courseware
    • 2 Exam vouchers
    • IAPP membership

    **GDPR Regulation Mandated May 25, 2018**

    Course Objectives:

    See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance

    See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance

    Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.

    TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

    TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 4 Days

    Course Content:

     

    Prerequisites: None

    Target Audience:

    Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination

    Course Overview:

    This is a hands-on course that covers many of the concepts of securing the perimeter of an organization. This includes concepts such as intrusion detection, packet filtering, and central logging.

    A skills focus enables the student to better absorb the subject matter and perform better on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of Firewalls.

    This course is an excellent precursor to PA-215 Palo Alto Firewall Essentials FastTrack.

    Attendees to TN-949: Certified Firewall Analyst Prep will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Analyzing Network and Wireless Design
    • Creating and Auditing a Rulebase
    • Firewall Assessment and Penetration Testing
    • Host-Based Detection and DLP
    • Incident Detection and Analysis
    • IOS and Router Security
    • IPv6 and ICMPv6
    • Log Collection and Analysis
    • NAT and Proxies
    • Netfilter IPtables
    • Network Access Control
    • Network-Based Intrusion Detection
    • Packet Filters and Inspection
    • Packet Fragmentation
    • Perimeter Concepts and IP Fundamentals
    • Securing Hosts and Services
    • TCP/IP Protocols
    • VPN Design and Auditing
    • VPN Implementation

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, networking and security  experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!