Course Overview:

This course is extremely fast paced and for students that have already had UNIX or Linux training, or have not worked with Linux in several months or years.  This is NOT a course for students new to Linux and assumes the student requires a refresher before progressing through high end security courses that require dexterity on Linux.  RedHat and Ubuntu, VMware Virtual Machines, and BackTrack are used for the instruction of this course.  The student will acquire the skills to easily navigate the advanced VMware training environment and will be able to create scripts to manipulate and manage Linux.  The ulimate goals of the skills of this course is to provide the student the ability to automate through scripting BackTrack tools for offensive security, forensics, and defense.

Attendees to L-395: Accelerated Linux Administration and Utilities will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

Day 1 and 2: Unix Review and Unix  Utilities

  • Linux File System Archictecure and In-Depth discussion of Hard and Soft Links
  • Linux File, Directory, and Permissions Management
  • Linux  archives using tar and zip
  • Interacting with BASH
  • Review of Common Linux commands
  • Sorting files by line or field
  • Regular Expressions (meta character) with grep commands to locate specific lines in files
  • Grep, egrep extended metacharacters, combinations-lab advanced combinations- lab Sed
  • Basic commands- Lab, Advanced commands- Lab, Advanced scripting -Lab
  • Miscellaneous commands Tr, sort, cut, past, pr -Lab
  • Performing non-interactive editing tasks with the sed command
  • Writing simple sed scripts to perform complex editing tasks
  • Using awk variables & arrays to sort data
  • Employing awk programs to manipulate numeric & textual data
  • Performing formatted printing in awk
  • Writing simple awk programs to write reports from data files
  • Using built-in awk functions & defining new functions
  • Write awk programs that make decisions based on numeric or string comparisons (branches & loops)
 
Day 3 – Intro to Programming / Shell Scripting
  • Shell Review
  • Shell Interpretation of Quotes & Backslash
  • The Bash Shell
  • Shell's combined with UNIX utilities
  • Programming Basics
  • Data Constructs
  • Programming Looping
  • Your Environment
  • More on Parameters

Day 4 and 5 – Security Fundamentals, Linux Administration

  • System Configuration / Kernel overview 
  • System Maintenance / Disk and file admin
  • Using utilities for process control, locating files & automating maintenance tasks
  • System Startup / Boot Process – LILO & GRUB Configuration
  • Managing the Linux file system
  • Customization of setup files
  • Run Levels
  • Network Services / Configuration
  • User Management Monitoring, accessing & restricting root system access
  • Administration Tools
  • Process Control
  • Client side components of NFS, Samba, NTP, NIS
  • Server side components such as DHCP, Samba, NIS, LDAP, inet, telnet, ftp, DNS, etc.

Prerequisites:

  • Prior UNIX/Linux experience or training

Comments

Latest comments from students


User: mikenaya

Instructor comments: As usual, Dave was excellent and the content was very relevant to our line of work.

Facilities comments: The hotel facilities met our basic needs but it was awkward having a bathroom so close. I can't wait for the new facility to open.


User: fquinene

Instructor comments: Instructor was super knowledgeable and helped me tie in a lot of information from other OS and processes.

Facilities comments: Facility was fine


Liked the class?  Then let everyone know!

 

Course Overview:

This course gives students the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues.  This course includes material contained in Microsoft’s 6424, 6425, 6426 and is an aid to preparation for the 70-640 exam.

Attendees to TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Installation
  • Administration
  • Users
  • Groups
  • Computers
  • Group Policy Infrastructure
  • Group Policy Settings
  • Domains and Forests

Prerequisites:

  • Basic understanding of networking
  • Intermediate understanding of network operating system
  • An awareness of security best practices
  • Basic knowledge of server hardware
  • A+ or equivalent knowledge
  • Some experience creating objects in Active Directory
  • Basic concepts of backup and recovery in a Windows Server Environment

Comments

Latest comments from students




Liked the Class?  Then let everyone know!

 

Course Overview:

Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Outline:

  • Identity and access
    • Configure Azure Active Directory for Azure workloads and subscriptions
    • Configure Azure AD Privileged Identity Management
    • Configure security for an Azure subscription
  • Platform Protection
    • Understand cloud security
    • Build a network
    • Secure network
    • Implement host security
    • Implement platform security
    • Implement subscription security
  • Security Operations
    • Configure security services
    • Configure security policies by using Azure Security Center
    • Manage security alerts
    • Respond to and remediate security issues
    • Create security baselines
  • Data and Applications
    • Configure security policies to manage data
    • Configure security for data infrastructure
    • Configure encryption for data at rest
    • Understand application security
    • Implement security for application lifecycle
    • Secure applications
    • Configure and manage Azure Key Vault

Prerequisites :

      • AZ-900: Microsoft Azure Fundamentals
      • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
      • Student must be able to program in an Azure Supported Language.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:

The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances, and maintaining an enterprise deployment of OpenStack. This course also teaches the management and customization of an enterprise deployment of OpenStack (overcloud) and how to manage compute nodes with Red Hat OpenStack Platform director (undercloud).

Attendees to CL-345: Red Hat OpenStack Administration II will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Prerequisites:

This course is intended for Linux system administrators, cloud administrators, cloud operators, and infrastructure architects interested in, or responsible for, maintaining a private or hybrid cloud.

Prerequisites for this course is Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent experience.

Attend Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL115), or demonstrate equivalent experience

Course Outline:

  • Navigate the Red Hat OpenStack Platform architecture
  • Describe the OpenStack control plane
  • Integrate Identity Management
  • Perform image operations
  • Manage storage
  • Manage OpenStack networking
  • Manage compute resources
  • Automate could applications
  • Troubleshoot OpenStack operations
  • Comprehensive review

 

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • PM-325: Project Management Professional (PMP) Exam Preparation
    • 08/04/2025 – 08/08/2025
    • San Antonio
  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • in