Course Overview:

Red Hat System Administration: Linux Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration.  TechNow’s  Ansible course facilitates the dynamic IT infrastructure through automation.

This course also supports DevOps practices through Ansible playbooks automating workflows.  TechNow has operated Automated Unix and Linux environment for over 35 years and brings this field experience to the classroom utilizing ansible and discussing its impact on: Infrastructure (Linux, Windows, network devices), Cloud automation (AWS and Azure), Application deployment, Security & compliance, and CI/CD pipelines.

This course also ties in nicely with the TechNow course CL-355: Containers, Kubernetes, and Red Hat OpenShift Administration which provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1).

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • An introduction to Ansible
  • Install and configure Ansible development tools in VS Code and configure Ansible setting
  • Create and update inventories of managed hosts and manage connections to them
  • Automate administration tasks with Ansible Playbooks
  • Write effective playbooks at scale
  • Protect sensitive data used by Ansible Automation Platform with Ansible Vault
  • Reuse code and simplify playbook development with Ansible Roles and Ansible Content Collections
  • Developing Automation Content: Variables, Task Control, Deploying Files
  • Developing Automation Content at Scale
  • Reusing Code with Ansible Roles and Content Collections
  • Automate Linux Administration Tasks

Prerequisites:

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Increase your credibility, job security, and career opportunities by reaching your goal and getting certified!  TechNow offers many CompTIA bootcamp style courses in which we administer an exam on the last day of class.  We have a proven testing program that will get you the results you want!

in   
 

Course Overview:

Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Outline:

  • Identity and access
    • Configure Azure Active Directory for Azure workloads and subscriptions
    • Configure Azure AD Privileged Identity Management
    • Configure security for an Azure subscription
  • Platform Protection
    • Understand cloud security
    • Build a network
    • Secure network
    • Implement host security
    • Implement platform security
    • Implement subscription security
  • Security Operations
    • Configure security services
    • Configure security policies by using Azure Security Center
    • Manage security alerts
    • Respond to and remediate security issues
    • Create security baselines
  • Data and Applications
    • Configure security policies to manage data
    • Configure security for data infrastructure
    • Configure encryption for data at rest
    • Understand application security
    • Implement security for application lifecycle
    • Secure applications
    • Configure and manage Azure Key Vault

Prerequisites :

      • AZ-900: Microsoft Azure Fundamentals
      • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
      • Student must be able to program in an Azure Supported Language.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • AZ-900: Microsoft Azure Fundamentals
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
    • 01/20/2026 – 01/23/2026
    • San Antonio
  • PM-223: Introduction to Project Management
    • 01/20/2026 – 01/22/2026
    • San Antonio
  • CT-205: A+ Certification Course
    • 01/26/2026 – 01/30/2026
    • San Antonio
  • TN-125: Introduction to UNIX and Linux
    • 01/26/2026 – 01/30/2026
    • San Antonio
  • in   

    Course Overview:

    PowerShell is made for Security Operations (SecOps) automation on Windows. SecOps requires automation in order to scale out security changes and monitoring beyond a handful of hosts. For example, when a vulnerability must be remediated but there is no patch for it yet, automation is needed to quickly and consistently enact the changes necessary. PowerShell “remoting” is encrypted remote command execution of PowerShell scripts in a way that can scale to thousands of endpoints and servers.

    Imagine being able to hunt for indicators of compromise across thousands of machines with just a few lines of PowerShell code. Or imagine having the local Administrator account password reset every night on thousands of endpoints in a secure way, and being able to retrieve that password securely too.

    We will show you to do these tasks and more. Transcription logging for forensics, strong encryption code signing, application whitelisting of scripts, IPSec port control, and Just Enough Admin (JEA).

    As more and more of our systems are moved up to the cloud, PowerShell will become even more important. Amazon Web Services, Microsoft Azure, Office 365, Hyper-V and VMware already support PowerShell administration for many tasks.

    Attendees to TN-965: Windows Security Automation with PowerShell will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    04/13/2026 - 04/17/2026
    08:00 -16:00
    TN-965 Windows Security Automation with Powershell
    TechNow, Inc, San Antonio TX
    07/13/2026 - 07/17/2026
    08:00 -16:00
    TN-965 Windows Security Automation with Powershell
    TechNow, Inc, San Antonio TX
    10/26/2026 - 10/30/2026
    08:00 -16:00
    TN-965 Windows Security Automation with Powershell
    TechNow, Inc, San Antonio TX

    Duration: 5 days

    Intended Audience
    This course is intended for IT Professionals already experienced in general Windows Server and Windows Client administration or already experienced in administering and supporting Application servers and services including applications like Exchange, SharePoint, and SQL. It is broadly intended for students who want to use Windows PowerShell to automate administrative tasks from the command line, using any Microsoft or independent software vendor (ISV) product that supports Windows PowerShell manageability.

    Course Objectives:

    PowerShell Overview and Tips

      • Getting started running commands
      • Using and updating the built-in help
      • Execution policies
      • Fun tricks with the ISE graphical editor
      • Piping .NET and COM objects, not text
      • Using properties and methods of objects
      • Helping Linux admins feel more at home
      • Aliases, cmdlets, functions, modules, etc.
      • Customizing your profile script

    What Can We Do With PowerShell

      • PowerShell remote command execution
      • Fan-out remoting and security
      • File copy via PowerShell remoting
      • Capturing the output of commands
      • Parsing text files and logs with regex patterns
      • Searching remote event logs faster with XPath
      • Mounting the registry as a drive
      • Exporting data to CSV, HTML and JSON files
      • Parsing and mining nmap port scanner XML output
      • Running scripts as scheduled jobs
      • Pushing out scripts through Group Policy
      • Importing modules and dot-sourcing functions
      • http://www.PowerShellGallery.com

    Write your own scripts

      • Writing your own functions
      • Passing arguments into your scripts
      • Function parameters and returning output
      • Flow control: if-then, do-while, foreach, switch
      • The .NET Framework class library: a playground
      • How to pipe data in/out of your scripts

    Continuous Secure Configuration Enforcement

      • How to use Group Policy and PowerShell together
      • Automate with INF security templates
      • How to customize INF templates
      • Microsoft Security Compliance Manager (SCM)
      • SECEDIT.EXE scripting
      • Building an in-house security repository for SecOps/DevOps
      • NSA’s Secure Host Baseline GPOs

    Group Policy Precision Targeting

      • Managing Group Policy Objects (GPOs) with PowerShell
      • LSDOU, Block Inheritance, Enforced GPOs
      • Group Policy permissions for targeting changes
      • ADMX templates for mass registry editing
      • Deploying PowerShell startup and logon scripts
      • WMI item-level targeting of GPO preferences
      • GPO scheduled tasks to run PowerShell scripts
      • Remote command execution via GPO (not remoting)
      • Empowering the Hunt Team to fight back!

    Server Hardening for SecOps/DevOps

      • Server Manager scripting with PowerShell
      • Adding and removing roles and feature
      • Remotely inventory roles, features, and apps
      • Why Server Nano or Server Core
      • Running PowerShell automatically after service failure
      • Service account identities, passwords, and risks
      • Tools to reset service account passwords securely

    PowerShell Desired State Configuration (DSC)

      • DSC is Configuration Management built in for free
      • Using DSC for continuous reinforcement of settings
      • Writing your own DSC configuration scripts
      • Free DSC resource modules: www.PowerShellGallery.com
      • How to push DSC configurations to many targets
      • DSC background job processing in push mode
      • Examples: sync files, install roles, manage groups
      • Auditing a remote target against a DSC MOF template
      • “ApplyAndAutoCorrect” mode for continuous enforcement

    PowerShell Just Enough Admin (JEA)

      • JEA is Windows sudo, like on Linux
      • JEA is Windows setuid root, like on Linux
      • Restricting commands and arguments
      • Verbose transcription logging
      • How to set up and configure JEA
      • Privilege Access Workstations (PAWs)

    PowerShell and WMI

      • Windows Management Instrumentation (WMI) service
      • What is WMI and why do hackers abuse it so much?
      • Using PowerShell to query WMI CIM classes
      • WMI authentication and traffic encryption
      • Inventory operating system versions and installed software
      • WMI remote command execution versus PowerShell remoting
      • PowerShell security best practices
      • PowerShell transcription logging to catch hackers

    Prerequisites:

    • Previous Windows Server and Windows Client management knowledge and hands on experience.
      Experience installing and configuring Windows Server into existing enterprise environments, or as standalone installations.
    • Knowledge and experience of network adapter configuration, basic Active Directory user administration, and basic disk configuration.
    • Knowledge and hands on experience specifically with Windows Server 2012/Windows Server 2012 R2 and Windows 8/Windows 8.1 would be of benefit but is not essential.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!