Further Information about TechNow, Location, and how to contact us.
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of the attacks and the effectiveness.
Attendees to TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Accessing the Network
- Advanced Fuzzing Techniques
- Advanced Stack Smashing
- Attacking the Windows Domain – Enumeration
- Attacking the Windows Domain – Restricted Desktops
- Attacking the Windows Domain – The Attacks
- Building a Metasploit Module
- Crypto for Penetration Testers
- Exploiting the Network
- Fuzzing Introduction and Operation
- Introduction to Memory and Dynamic Linux Memory
- Introduction to Windows Exploitation
- Manipulating the Network
- Python and Scapy For Penetration Testers
- Shellcode
- Smashing the Stack
- Windows Heap Overflow Introduction
- Windows Overflows
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: ryanv Instructor comments: Great. Facilities comments: N/A. Hotel. User: sean.hollinger Instructor comments: Instructor is technically knowledgeable as he has been on every course I've taken with TechNow. Facilities comments: adequate
Liked the class? Then let everyone know!
Course Overview:
CT-395: CompTIA CySA+ Cybersecurity Analyst is for IT professionals looking to gain IT security analyst skills, and for those following the recommended skills pathway to achieve cybersecurity mastery. It provides a bridge between CompTIA Security+ (CT-325) and CompTIA SecurityX (CT-425), thus completing a certification path within the CompTIA family of certifications. As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CySA+ applies behavioral analytics to the IT security market to improve the overall state of security. The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization. Let us help you bridge this gap, and leave you prepared for the certification exam (CS0-003).
TechNow is a CompTIA partner uses official CompTIA CySA+ curriculum.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
12/01/2025 - 12/05/2025 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
|
03/02/2026 - 03/06/2026 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
|
06/01/2026 - 06/05/2026 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
|
08/24/2026 - 08/28/2026 08:00 -16:00 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
|
11/16/2026 - 11/20/2026 08:00 -16:15 |
CT-395: CySA+ Cybersecurity Analyst TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Objectives:
- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
Prerequisites:
While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CT-325: Security+ or equivalent experience. It is recommended for CompTIA CySA+ candidates to have the following:
- 3-4 years of hands-on information security or related experience
- Network+, Security+, or equivalent knowledge.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This is an introductory course into the Python scripting language. This class uses a hands-on approach in teaching the Python language. This course builds the prerequisite skills for TechNow's P-345: Python for Pentration Testers course. Getting comfortable with Python is important to understanding how Python can be utilitized for offensive measures.
This course is hands-on with the instructor walking the students through many short examples to exemplify an objective. Dexterity with the language comes through many small code examples to produce the desired result. Students have fun acquiring points for all the code examples they get correct. We must be having fun because TechNow is always amazed at how competitive students are in trying to acquire the most points!
The instructor will focus on the level that each student is currently at, and ensure the student absorbs the subject matter. Programming is not a daily tasking of administrators or offensive operators and TechNow understands that. As an instructor led course TechNow is very successful in making Python accessible to those who do not live eat and breath programming. If a student's ultimate goal is to attend a course like TechNow's P-345: Python for Pentration Testers course, then not being bogged down in the Python language is critical, and this course (P-325: Python Programming) meets that objective.
Recently we have introduced Raspberry Pi's and multiple sensors to the P-325: Python Programming course. This enables the student to actually see productive results from their coding skills in the physical world! Some examples that students create programs for are: Motion detectors, distance, temperature, cameras and keypads.
Attendees to P-325: Python Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- How Python Runs Programs
- Introducing Python Object Types
- Numeric Types
- Dynamic Typing
- Variables
- Regular Expressions
- Strings
- Conditionals
- if Tests and Syntax Rules
- Lists and Dictionaries
- Tuples and Files
- Introducing Python Statements
- Assignments, Expressions, and Prints
- while and for Loops
- Iterations and Comprehensions
- Documentation
- Function Basics
- Built-In Functions
- Scopes
- Arguments
- Modules
- Module Packages and Importing
- Classes and OOP
- Operator Overloading
- Recursion
- Exception Coding Details
- Exception Objects
- Unicode and Byte Strings
- Working with Raspberry Pi
- Writing code for sensors
Prerequisites:
- Experience with some form of programming is preferred
Comments
Latest comments from students
User: slewis8435
Instructor comments: Very good instructor - he was excited about the material, very knowledgeable, and explained things clearly.
Facilities comments: The facilities were fine - plenty of room for each student to set up an extra computer and have room for note taking
User: nathan.karras
Instructor comments: Instructor was extremely knowledgeable in programming and scripting. He encouraged students to explore and ask questions. He would work with individuals to troubleshoot lab problems sets. Would highly recommend as an instructor.
Facilities comments: Room got a little warn. Instructor purchased fans to cool things off for the class. Projector had over scan.
Liked the class? Then let everyone know!
Course Overview:
Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.
Date/Locations:
Course Duration: 5 days
Course Outline:
- Identity and access
- Configure Azure Active Directory for Azure workloads and subscriptions
- Configure Azure AD Privileged Identity Management
- Configure security for an Azure subscription
- Platform Protection
- Understand cloud security
- Build a network
- Secure network
- Implement host security
- Implement platform security
- Implement subscription security
- Security Operations
- Configure security services
- Configure security policies by using Azure Security Center
- Manage security alerts
- Respond to and remediate security issues
- Create security baselines
- Data and Applications
- Configure security policies to manage data
- Configure security for data infrastructure
- Configure encryption for data at rest
- Understand application security
- Implement security for application lifecycle
- Secure applications
- Configure and manage Azure Key Vault
Prerequisites :
-
-
- AZ-900: Microsoft Azure Fundamentals
- Students should have 1-2 years professional development experience and experience with Microsoft Azure.
- Student must be able to program in an Azure Supported Language.
-
Comments
Latest comments from students