After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

     

     

     

     

     

     

     

    Course Overview:

    The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

    The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

    What’s Included:

    • 5 days of instructor-led in classroom training
    • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
    • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
    • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
    • CHFI Courseware
    • Exam Voucher
    • CHFI onsite exam scheduling

    Course Objectives:

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
    • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
    • Identify & check the possible source/ incident origin
    • Recover deleted files and partitions in Windows, MAC OS X, and Linux
    • Conduct reverse engineering for known and suspected malware files
    • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

    Dates/Locations:

    Date/Time Event
    03/23/2026 - 03/27/2026
    08:00 -16:00
    TN-415: Computer Hacking Forensics Investigator (CHFI)
    TechNow, Inc, San Antonio TX
    06/29/2026 - 07/03/2026
    08:00 -16:00
    TN-415: Computer Hacking Forensics Investigator (CHFI)
    TechNow, Inc, San Antonio TX
    09/28/2026 - 10/02/2026
    08:00 -16:00
    TN-415: Computer Hacking Forensics Investigator (CHFI)
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Content:

      • Module 01. Computer Forensics in Today’s World
      • Module 02. Computer Forensics Investigation Process
      • Module 03. Understanding Hard Disks and File Systems
      • Module 04. Data Acquisition and Duplication
      • Module 05. Defeating Anti-forensics Techniques
      • Module 06. Operating System Forensics (Windows, Mac, Linux)
      • Module 07. Network Forensics
      • Module 08. Investigating Web Attacks
      • Module 09. Database Forensics
      • Module 10. Cloud Forensics
      • Module 10. Malware Forensics
      • Module 11. Investigating Email Crimes
      • Module 12. Investigating Email Crimes
      • Module 13. Mobile Forensics
      • Module 14. Forensics Report Writing and Presentation

     

    Prerequisites:

        • 2+ years of proven information security work experience
        • Educational background with digital security specialization

      Target Audience:

        • Law Enforcement
        • Defense & Military
        • E-Business Security
        • Systems Administrators
        • Legal Professionals
        • Banking & Insurance professionals
        • Government Agencies
        • IT Managers

    • Comments

      Latest comments from students


      Liked the class?  Then let everyone know!

     

    Course Overview:

    The HCISPP is the only certification that combines cybersecurity skills with privacy best practices and techniques. It demonstrates you have the knowledge and ability to implement, manage, and assess security and privacy controls to protect healthcare organizations using policies and procedures established by the cybersecurity experts at (ISC)2. TechNows HCISPP Certification Boot Camp is a comprehensive review of Healthcare cybersecurity with privacy best practices & industry best practices.

    Attendees to TN-8155: HCISPP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction..

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Strategically focus your preparation for HCISPP Certification
    • Cover a broad spectrum of topics in the 7 domains of the HCISPP Common Body of Knowledge (CBK)
    • Gain knowledge on the Healthcare industry including third party relationships and health data management concepts
    • Identify applicable regulations, compliance frameworks, privacy principles and policies to protect information security
    • Develop risk management methodology and identify control assessment procedures

    Audience:

    • The HCISPP certification is ideal for security professionals responsible for safeguarding protected health information (PHI). Take this HCISPP training course to prepare to manage and implement security controls for healthcare information. HCISPPs are instrumental to a variety of job functions: Compliance Officer, Information Security Manager, Privacy Officer, Compliance Auditor, Risk Analyst, Medical Records Supervisor, IT Manager, Privacy & Security Consultants, and Health Information Manager.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination
     

    Course Overview:

    The CT-325: Security+ (SY0-701) class is the primary class you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It will also help you prepare for the CompTIA Security+ examination (exam number SY0-701). In the CT-325: Security+ class you’ll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.  Let us help you prepare for the CompTIA Security+ exam (SY0-701).

    TechNow is a CompTIA partner and uses official CompTIA Security+ curriculum.

    Attendees to CT-325: Security+ will receive TechNow approved course materials and TechNow expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    12/15/2025 - 12/19/2025
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    02/09/2026 - 02/13/2026
    08:00 -16:00
    CT-325: Security+
    TechNow – San Antonio, TX, San Antonio TX
    04/13/2026 - 04/17/2026
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    07/06/2026 - 07/10/2026
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    09/21/2026 - 09/25/2026
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX
    11/16/2026 - 11/20/2026
    08:00 -16:00
    CT-325: Security+
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Compare and contrast attacks
    • Compare and contrast security controls
    • Use security assessment tools
    • Explain basic cryptography concepts
    • Implement a public key infrastructure
    • Implement identity and access management controls
    • Manage access services and accounts
    • Implement a secure network architecture
    • Install and configure security appliances
    • Install and configure wireless and physical access security
    • Deploy secure host, mobile, and embedded systems
    • Implement secure network access protocols
    • Implement secure network applications
    • Explain risk management and disaster recovery concepts
    • Describe secure application development concepts
    • Explain organizational security concepts

    Prerequisites:

    • CompTIA A+ and Network+ certifications, or equivalent knowledge.
    • Windows 7/8/10 and Server 2008/2012/2016 experience required.
    • Six to nine months experience in networking, including experience in configuring & managing TCP/IP.

    Comments

    Latest comments from students


    User: joshjepsen@hotmail.com

    Instructor comments: Instructor was very knowledgeable on all the course content. There were some instances when I felt he streamlined through some of the material too quickly, such as going over how to identify types of attacks.



     

    Liked the class?  Then let everyone know!