Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
DoD 8570 Training in San Antonio, TX.
TechNow has developed a proven training program that brings the skillset to the certification process. TechNow is a mobile testing center that can deliver D0D 8570 training and the certification in one week. Our intergrated DoD 8570 training in San Antonio, TX incorporates hands on skills with testing objectives that produces an incredibly high pass rate. To learn more about our DoD 8570 training program click here
TechNow provides a wide variety of skills based computer training and testing. With our Headquarters in San Antonio, TX, we have provided services including computer training around the United States to many individuals and corporations.
Our products and services are designed for those who are seeking to expand their knowledge base, whether with one class or a series of classes to gain certification in specific areas of training.
Our talented and knowledgeable instructors enjoy teaching and sharing their skills; allowing you to expand and learn essential computer skills.
This is a list of some of our Products and Services
Hardware, Software, and Consulting
Classroom in a Box
Authorized Testing Center
Customized Training
Course Overview:
This course will provide students with proficiency in the everyday management of Linux based clients and basic management of server system. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux based clients, server systems and security. Let us help you prepare for the CompTIA Linux+ exam (XK0-005).
TechNow is a CompTIA partner and uses official CompTIA Linux+ curriculum.
Attendees to CT-245: Linux+ will receive TechNow approved course materials and expert instruction.
Dates/Locations:
| Date/Time |
Event |
12/01/2025 - 12/05/2025
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
02/09/2026 - 02/13/2026
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
05/11/2026 - 05/15/2026
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
08/10/2026 - 08/14/2026
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
11/02/2026 - 11/06/2026
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
Duration: 5 Days
Course Objectives:
- Perform basic Linux tasks
- Manage users and groups
- Manage permissions and ownership
- Manage storage
- Manage files and directories
- Manage kernel modules
- Manage the Linux boot process
- Manage system components
- Manage devices
- Manage networking
- Manage packages and software
- Secure Linux systems
- Write and execute Bash shell scripts
- Automate tasks
- Plan and perform a Linux installation
Prerequisites:
Comments
Latest comments from students
User: cwbrind
Instructor comments: Great experience with Mr. Peterson, would recommend again. Highly knowledgable and approachable for any subject.
Facilities comments: The Holiday Inn was a nice location for learning despite traffic around the area.
Liked the class? Then let everyone know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
-
-
- Pass the CEH exam
- Pass the CND exam
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!