Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Welcome to TechNow! The Leader in Information Security Training & Computer Training.
The world of information security and computer training is ever changing. The techniques and systems continue to evolve and we must stay current and diligent. To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.
TechNow® has been training the leaders in the computer community for many years. We provide training for students in a number of areas. Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more. With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.
TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.
.

TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:
- TN-345: Python for Penetration Testers
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-909: Windows Forensic Analysis
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good