Here are the General Unix course offerings:
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.
Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Manage Identity
- Plan Desktop and Device Deployment
- Plan and Implement a Microsoft 365 Solution
- Configure Networking
- Configure Storage
- Manage Data Access and Protection
- Manage Remote Access
- Manage Apps
- Manage Updates and Recovery
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam from EC-Council.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council official iLabs code with access for 6 months
- EC-Council official Certificate of Attendance
- CEH Exam Voucher
Dates/Locations:
| Date/Time | Event |
|---|---|
|
02/23/2026 - 02/27/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
06/01/2026 - 06/05/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
08/24/2026 - 08/28/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
|
11/30/2026 - 12/04/2026 08:00 -16:00 |
TN-555: Certified Ethical Hacker v13 (CEH) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Introduction to Ethical Hacking
- Module 02. Foot-printing and Reconnaissance
- Module 03. Scanning Networks
- Module 04. Enumeration
- Module 05. Vulnerable Analysis
- Module 06. System Hacking
- Module 07. Malware Threats
- Module 08. Sniffing
- Module 09. Social Engineering
- Module 10. Denial-of-Service
- Module 11. Session Hijacking
- Module 12. Evading IDS,Firewalls, and Honeypots
- Module 13. Hacking Web Servers
- Module 14. Hacking Web Applications
- Module 15. SQL Injection
- Module 16. Hacking Wireless Networks
- Module 17. Hacking Mobile Platforms
- Module 18. IoT and OT Hacking
- Module 19. Cloud Computing
- Module 20. Cryptography
Prerequisites:
- Windows operating system and/or Linux operating system or other Unix-based OS
- TCP/IP protocols and implementation
- At least 2 years of IT security experience
- TN-325:Security+
Target Audience:
Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Here are the Cisco Security course offerings:
- N-305: CCNA Bootcamp
- N-325: Implementing Cisco IOS Network Security (IINS)
- N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI)
- N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW
- TN-865: Wireshark Network Traffic and Security Analysis
Course Overview:
SecurityX® (formerly known as CASP+) course prepares you for the CompTIA SecurityX® certification exam (CVO-005) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. This course will prepare students for the objectives covered in the CompTIA SecurityX certification exam (CVO-005).
Attendees to CT-425: CompTIA SecurityX will receive TechNow approved course materials and expert instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
03/09/2026 - 03/13/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
06/08/2026 - 06/12/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
08/31/2026 - 09/04/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
|
11/30/2026 - 12/04/2026 08:00 -16:00 |
CT-425: CompTIA SecurityX TechNow, Inc, San Antonio TX |
Duration: 5 days
Course Objectives:
- Support IT governance in the enterprise with an emphasis on managing risk
- Leverage collaboration tools and technology to support enterprise security
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for mobile devices
- Implement network security
- Implement security in the systems and software development lifecycle
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
- Conduct security assessments
- Respond to and recover from security incidents
Prerequisites:
Completion of the following or equivalent knowledge:
Minimum of 10 years general hands on IT experience
5 years being hands-on security
CompTIA Certification: Network+
CompTIA Certification: Security+
CompTIA Certification: CySA+
OR equivalent knowledge
Comments
Latest comments from students
User: clbrack
Instructor comments: I expect to pass, another great class from technow!
User: christopher0470
Instructor comments: Alan takes the time to cover the material so that you understand the concepts and applications of the information presented.
Facilities comments: I like the location. It was quiet and very conducive to learning.