Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-210: Project+
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 02/17/2026 – 02/20/2026
    • San Antonio
  • N-305: CCNA Bootcamp
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 02/23/2026 – 02/27/2026
    • San Antonio
  • in   
     

     

     

     

     

     

    Course Overview:

    PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

     

     

     

     

    What’s Included:

    • 5 days of instructor led in classroom training
    • Labs
    • PenTest+ Courseware
    • Exam Voucher
    • PenTest+ onsite exam scheduling

    Course Objectives:

    • Plan and scope penetration tests
    • Conduct passive reconnaissance
    • Perform non-technical tests to gather information
    • Conduct active reconnaissance
    • Analyze vulnerabilities
    • Penetrate networks
    • Exploit host-based vulnerabilities
    • Test application
    • Complete post-exploit tasks
    • Analyze and report pen test results

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Content:

      • Module 01. Planning and Scoping Penetration Tests
      • Module 02. Conducting Passive Reconnaissance
      • Module 03. Performing Non-Technical Tests
      • Module 04. Conducting Active Reconnaissance
      • Module 05. Analyzing Vulnerabilities
      • Module 06. Penetrating Networks
      • Module 07. Exploiting Host-Based Vulnerabilities
      • Module 08. Testing Applications
      • Module 09. Completing Post-Exploit Tasks
      • Module 10. Analyzing and Reporting Pen Test Results

     

    Prerequisites:

    Target Audience:

    This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    In this course, administrators of medium-to-large network sites will learn to use advanced routing to provide scalability for Cisco routers that are connected to LANs and WANs. Networking professionals will learn to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. Hands-on labs ensure you thoroughly understand how to implement advanced routing within your network.

    Attendees to N-405: ROUTE-Implementing Cisco IP Routing will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Planning Routing Services to Requirements
    • Implementing an EIGRP-Based Solution
    • Implementing a Scalable Multiarea Network
    • OSPF-Based Solution
    • Implement an IPv4- Based Redistribution Solution
    • Implementing Path Control Connection of an Enterprise Network to an ISP Network

    Prerequisites:

    • None

     

    Comments

    Latest comments from students


    User: jrtrussell

    Instructor comments: Awesome

    Facilities comments: Awesome


    Liked the class?  Then let everyone know!

     

    Course Overview:
    This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

    Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Manage Identity
    • Plan Desktop and Device Deployment
    • Plan and Implement a Microsoft 365 Solution
    • Configure Networking
    • Configure Storage
    • Manage Data Access and Protection
    • Manage Remote Access
    • Manage Apps
    • Manage Updates and Recovery

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    This FastTrack course combines combines two VMware courses (VMware Cloud Essentials and vCloud Architecting the VMware Cloud) into a single week course that adds extra exercises and labs to exemplify the techniques presented.  The course begins with how to adopt, operate, and govern the cloud. The course enables participants to successfully complete the associated CompTIA Cloud Essentials™ Exam to become a Cloud Essentials™ Professional(CEP). This course also covers the subject matter specified by the VCP-Cloud certification.

    This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud environment. Detailed labs and exercises for VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. A comprehensive VMware cloud design is demonstrated and discussed.

    Attendees to VM-335:  VMware Cloud Essentials and vCloud – Architecting the VMware Cloud FastTrack will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Understand the common terms and definitions of cloud computing.
    • Understand the business benefits and business considerations of cloud computing.
    • Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
    • Understand the impact and changes of cloud computing on IT service management.
    • Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
    • Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
    • Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
    • Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
    • Design a network infrastructure optimized for vCloud.
    • Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security rolesnderstand the common terms and definitions of cloud computing.
    • Understand the business benefits and business considerations of cloud computing.
    • Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
    • Understand the impact and changes of cloud computing on IT service management.
    • Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
    • Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
    • Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
    • Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources.
    • Design a network infrastructure optimized for vCloud.
    • Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles.
    • Design a vCenter Chargeback implementation.

    Course Prerequisites:

    • VM-315  or equivalent experience.
    • Managing or administering at least one of UNIX, Windows, databases, networking, or security.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!