Course Overview:

This intensive hands-on class teaches students to develop customized UNIX™ commands, read & write Bourne, Korn & Bash Shell scripts & automate critical server functions.  The course includes extensive lab exercises, including hands-on development & debugging of shell scripts, which will give students the ability to be more efficient and productive in less time. The focus of the course will be the Bash shell.

Attendees to TN-215: Shell Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

Date/Time Event
03/23/2026 - 03/27/2026
08:00 -16:00
TN-215: Shell Programming
TechNow, Inc, San Antonio TX
06/22/2026 - 06/26/2026
08:00 -16:00
TN-215: Shell Programming
TechNow, Inc, San Antonio TX
09/14/2026 - 09/18/2026
08:00 -16:00
TN-215: Shell Programming
TechNow, Inc, San Antonio TX

Duration: 5 days

Course Objectives:

  • Shell Review
  • Shell Interpretation of Quotes & Backslash
  • The Bash Shell
  • Shell’s combined with UNIX utilities
  • Programming Basics
  • Data Constructs
  • Programming Looping
  • Your Environment
  • More on Parameters
  • Advanced Shell Programming

Prerequisites:

Comments

Latest comments from students



User: hnzarate

Instructor comments: Very knowledgeable.

Facilities comments: This hotel needs better water.


Liked the class?  Then let everyone know!

 

 

 

 

 

 

 

Course Overview:

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

What’s Included:

  • 5 days of instructor-led in classroom training
  • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
  • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
  • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
  • CHFI Courseware
  • Exam Voucher
  • CHFI onsite exam scheduling

Course Objectives:

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
  • Identify & check the possible source/ incident origin
  • Recover deleted files and partitions in Windows, MAC OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Dates/Locations:

Date/Time Event
03/23/2026 - 03/27/2026
08:00 -16:00
TN-415: Computer Hacking Forensics Investigator (CHFI)
TechNow, Inc, San Antonio TX
06/29/2026 - 07/03/2026
08:00 -16:00
TN-415: Computer Hacking Forensics Investigator (CHFI)
TechNow, Inc, San Antonio TX
09/28/2026 - 10/02/2026
08:00 -16:00
TN-415: Computer Hacking Forensics Investigator (CHFI)
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Content:

    • Module 01. Computer Forensics in Today’s World
    • Module 02. Computer Forensics Investigation Process
    • Module 03. Understanding Hard Disks and File Systems
    • Module 04. Data Acquisition and Duplication
    • Module 05. Defeating Anti-forensics Techniques
    • Module 06. Operating System Forensics (Windows, Mac, Linux)
    • Module 07. Network Forensics
    • Module 08. Investigating Web Attacks
    • Module 09. Database Forensics
    • Module 10. Cloud Forensics
    • Module 10. Malware Forensics
    • Module 11. Investigating Email Crimes
    • Module 12. Investigating Email Crimes
    • Module 13. Mobile Forensics
    • Module 14. Forensics Report Writing and Presentation

 

Prerequisites:

      • 2+ years of proven information security work experience
      • Educational background with digital security specialization

    Target Audience:

      • Law Enforcement
      • Defense & Military
      • E-Business Security
      • Systems Administrators
      • Legal Professionals
      • Banking & Insurance professionals
      • Government Agencies
      • IT Managers

  • Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 12/08/2025 – 12/11/2025
    • San Antonio
  • CT-425: CompTIA Advanced Security Practitioner (CASP+)
    • 12/08/2025 – 12/12/2025
    • San Antonio
  • CT-225: Network+
    • 12/15/2025 – 12/19/2025
    • San Antonio
  • in   
     

    Course Overview:

    This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.

    Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    01/05/2026 - 01/09/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX
    04/06/2026 - 04/10/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX
    07/27/2026 - 07/31/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX
    10/19/2026 - 10/23/2026
    08:00 -16:00
    CT-215: Cloud+
    TechNow, Inc, San Antonio TX

    Course Duration: 5 days

    Course Objectives:

    • Prepare to deploy cloud solutions
    • Deploy a pilot project
    • Test a pilot project deployment
    • Design a secure network for cloud deployment
    • Determine CPU and memory sizing for cloud deployments
    • Plan Identity and Access Management for cloud deployments
    • Analyze workload characteristics to ensure successful migration to the cloud
    • Secure systems to meet access requirements
    • Maintain cloud systems
    • Implement backup, restore, and business continuity measures
    • Analyze cloud systems for required performance
    • Analyze cloud systems for anomalies and growth forecasting
    • Troubleshoot deployment, capacity, automation, and orchestration issues
    • Troubleshoot connectivity issues
    • Troubleshoot security issues

    Course Prerequisites:

    • Security+, Network+, CASP or equivalent experience
    • Managing or administering at least one of UNIX, Windows, Databases, networking, or security

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!