Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • TN-825: Certified Information Security Manager (CISM) Seminar
    • 11/17/2025 – 11/21/2025
    • San Antonio
  • CT-245: Linux+
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 12/01/2025 – 12/05/2025
    • San Antonio
  • in   
     

    Course Overview:

    ITIL Version 4 is divided into 5 areas: Continual Service Improvement; Service Strategy; Service Design; Service Transition; and Service Operation.  These 5 areas support the overall focus of ITIL’s service management through the Service Life cycle.  IT-113: IT Infrastructure LIbrary (ITIL)- Foundations Course provides a detailed introduction of terms, definitions, benefits, and relationships of the following function and processes as well as roles and responsibilities that supports them.

    Attendees to IT-113: IT Infrastructure Library (ITIL) – Foundations Course will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    12/08/2025 - 12/11/2025
    08:00 -16:00
    IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    TechNow, Inc, San Antonio TX
    01/20/2026 - 01/23/2026
    08:00 -16:00
    IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    TechNow, Inc, San Antonio TX
    04/07/2026 - 04/10/2026
    08:00 -16:00
    IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    TechNow, Inc, San Antonio TX
    09/08/2026 - 09/11/2026
    08:00 -16:00
    IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    TechNow, Inc, San Antonio TX
    12/14/2026 - 12/17/2026
    08:00 -16:00
    IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    TechNow, Inc, San Antonio TX

    Duration: 3 Days

    Course Objectives:

    • Service Desk
    • Incident Management
    • Problem Management
    • Configuration Management
    • Financial Management for IT
    • IT Service Continuity Management
    • Service Level Management
    • Change Management
    • Release Management
    • Capacity Management
    • Availability Management

    Prerequisites:

    • Students should have some experience with the specification, development, installation and/or management of information technology.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM.  Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.

    Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.

    At the end of this course, you should understand the features and operations of View and be able to:

    • Install and configure View components
    • Create and manage dedicated and floating desktop pools
    • Deploy and manage linked-clone virtual desktops
    • Configure and manage desktops that run in local mode
    • Configure secure access to desktops through a public network
    • Use ThinApp to package applications

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Module 1: Course Introduction
    • Module 2: Introduction to VMware View
    • Module 3: View Connection Server
    • Module 4: View Desktops
    • Module 5: View Client Options
    • Module 6: View Administratory
    • Module 7: Configuring and Managing Linked Clones
    • Module 8: Local-Mode Desktops
    • Module 9: Command-Line Tools and Backup Options
    • Module 10: Managing VMware View Security
    • Module 11: View Manager Performance and Scalability
    • Module 12: VMware® ThinAppTM

    Prerequisites:

    • VM-315: VMware Infrastructure: Install, Configure and Manage
    • Experience in Microsoft Windows Active Directory Administration
    • Experience with VMware vSphereTM
    • Before attending the course, students must be able to perform the following tasks:
      • Create a template in VMware vCenterTM Server and deploy a virtual machine from it
      • Modify a template customization file
      • Open a virtual machine console in vCenter Server and access the guest operating system
      • Configure Active Directory services

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

    This course is designed for professionals that are expected to do malware analysis. A skills focus enables the student to better absorb the subject matter and perform successfully on the job.   This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics Reverse Engineering Malware.

    Attendees to TN-999: Reverse Engineering Malware will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • Toolkit and Lab Assembly
    • Malware Code and Behavioral Analysis Fundamentals
    • Malicious Static and Dynamic Code Analysis
    • Collecting/Probing System and Network Activities
    • Analysis of Malicious Document Files
    • Analyzing Protected Executables
    • Analyzing Web-Based Malware
    • DLL Construction and API Hooking
    • Common Windows Malware Characteristics in x86 Assembly
    • Unpacking Protected Malware
    • In-Depth Analysis of Malicious Browser Scripts, Flash Programs and Office
    • In-Depth Analysis of Malicious Executables
    • Windows x86 Assembly Code Concepts for Revers-Engineering Memory Forensics for Rootkit Analysis

    Prerequisites:

    • Strong understanding of core systems and network concepts
    • Exposure to programming and assembly concepts
    • Comfortable with command line access

    Comments

    Latest comments from students



    User: marcus.osullivan

    Instructor comments: Good stuff. I like the beginning half where there was help from an additional instructor to facilitate fixing computer errors that inevitably popped up.

    Facilities comments: The baby deer were neat! I like the resort.


    Liked the class?  Then let everyone know!

    CCFE Core Competencies

    • Procedures and Legal Issues
    • Computer Fundamentals
    • Partitioning Schemes
    • Data Recovery
    • Windows File Systems
    • Windows Artifacts
    • Report writing (Presentation of Finding)
    • Procedures and Legal issues
    1. Knowledge of search and subjection and rules for evidence as applicable to computer forensics.
    2. Ability to explain the on-scene action taken for evidence preservation.
    3. Ability to maintain and document an environment consolidating the computer forensics.
    • Computer Fundamentals
    1. Understand BIOS
    2. Computer hardware
    3. Understanding of numbering system (Binary, hexadecimal, bits, bytes).
    4. Knowledge of sectors, clusters, files.
    5. Understanding of logical and physical files.
    6. Understanding of logical and physical drives.
    • Partitioning schemes
    1. Identification of current partitioning schemes.
    2. Understanding of primary and extended partition.
    3. Knowledge of partitioning schemes and structures and system used by it.
    4. Knowledge of GUID and its application.
    • Windows file system
    1. Understanding of concepts of files.
    2. Understanding of FAT tables, root directory, subdirectory along with how they store data.
    3. Identification, examination, analyzation of NTFS master file table.
    4. Understanding of $MFT structure and how they store data.
    5. Understanding of Standard information, Filename, and data attributes.
    • Data Recovery
    1. Ability to validate forensic hardware, software, examination procedures.
    2. Email headers understanding.
    3. Ability to generate and validate forensically sterile media.
    4. Ability to generate and validate a forensic image of media.
    5. Understand hashing and hash sets.
    6. Understand file headers.
    7. Ability to extract file metadata from common file types.
    8. Understanding of file fragmentation.
    9. Ability to extract component files from compound files.
    10. Knowledge of encrypted files and strategies for recovery.
    11. Knowledge of Internet browser artifacts.
    12. Knowledge of search strategies for examining electronic
    • Windows Artifacts
    1. Understanding the purpose and structure of component files that create the windows registry.
    2. Identify and capability to extract the relevant data from the dead registry.
    3. Understand the importance of restore points and volume shadow copy services.
    4. Knowledge of the locations of common Windows artifacts.
    5. Ability to analyze recycle bin.
    6. Ability to analyze link files.
    7. Analyzing of logs
    8. Extract and view windows logs
    9. Ability to locate, mount and examine VHD files.
    10. Understand the Windows swap and hibernation files.
    • Report Writing (Presentation of findings)
    1. Ability to conclude things strongly based on examination observations.
    2. Able to report findings using industry standard technically accurate terminologies.
    3. Ability to explain the complex things in simple and easy terms so that non-technical people can understand clearly.
    4. Be able to consider legal boundaries when undertaking a forensic examination