Course Overview:

This course will provide students with proficiency in the everyday management of Linux based clients and basic management of server system. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux based clients, server systems and security.  Let us help you prepare for the CompTIA Linux+ exam (XK0-005).

TechNow is a CompTIA partner and uses official CompTIA Linux+ curriculum.

Attendees to CT-245: Linux+ will receive TechNow approved course materials and expert instruction.

Dates/Locations:

Date/Time Event
08/10/2026 - 08/14/2026
08:00 -16:00
CT-245: Linux+
TechNow, Inc, San Antonio TX
11/02/2026 - 11/06/2026
08:00 -16:00
CT-245: Linux+
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Perform basic Linux tasks
  • Manage users and groups
  • Manage permissions and ownership
  • Manage storage
  • Manage files and directories
  • Manage kernel modules
  • Manage the Linux boot process
  • Manage system components
  • Manage devices
  • Manage networking
  • Manage packages and software
  • Secure Linux systems
  • Write and execute Bash shell scripts
  • Automate tasks
  • Plan and perform a Linux installation

Prerequisites:

 

Comments

Latest comments from students


User: cwbrind

Instructor comments: Great experience with Mr. Peterson, would recommend again. Highly knowledgable and approachable for any subject.

Facilities comments: The Holiday Inn was a nice location for learning despite traffic around the area.



Liked the class?  Then let everyone know!

Certified AI Program Manager (CAIPM) is EC-Council’s professional certification for people responsible for owning AI decisions and driving execution: business, technology, data, and risk.

The Certified AI Program Manager (CAIPM) Course equips you with hands-on expertise across the full spectrum of AI tools, from conversational AI and image generation to code assistants and audio synthesis.

Participants will learn how to evaluate, deploy, and integrate AI tools into enterprise workflows, understanding not just how they work, but how to leverage them for maximum business impact. This course covers how to assess AI readiness across teams and processes, Prioritize AI use cases tied to business outcomes, Design adoption and rollout roadmaps , Coordinate delivery across cross-functional teams, implement governance, Responsible AI, and security controls , and how to track performance and ROI to prove value

By the end of the course, learners will be well-prepared to take the Certified AI Program Manager (CAIPM) exam and demonstrate the ability to own AI initiatives end to end , validate mastery of decision framing and trade-off analysis for AI initiatives and Apply governance, ethics, and risk management principles across the AI lifecycle.

Course Objectives:

•MLOps Principles: Model life cycle management for scalable, production-ready AI
•Use Case Evaluation: ROI-driven assessment and prioritization of AI initiatives
•AI Strategy Frameworks: Enterprise AI roadmapping, portfolio planning, and value prioritization
•AI Investment Justification: Quantifying AI value, ROI, and mission impact for funding decisions
•Change Management: Workforce enablement and stakeholder alignment
•KPI Development: AI metrics, success indicators, and executive dashboards
•AI Governance: Risk, ethics, compliance, and responsible AI principles
•Vendor Evaluation: AI platform and tool selection aligned with enterprise needs

Dates/Locations:

No Events

Prerequisites: Familiarity with generative AI concepts, prompt engineering fundamentals, and AI workflows will help you succeed. 

TN-412: Artificial Intelligence Essentials (AI|E)

 

 

Course Overview:

A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

What’s Included:

    • EC-Council official E-Courseware
    • EC-Council official Certificate of Attendance
    • EC-Council iLabs with access for 6 months
    • EC-Council CPENT Range access
    • CEH Exam Voucher

     

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Content:

      • Module 01. Introduction to Penetration Testing
      • Module 02. Penetration Testing Scoping and Engagement
      • Module 03. Open Source Intelligence (OSINT)
      • Module 04. Social Engineering Penetration Testing
      • Module 05. Network Penetration Testing – External
      • Module 06. Network Penetration Testing – Internal
      • Module 07. Network Penetration Testing – Perimeter Devices
      • Module 08. Web Application Penetration Testing
      • Module 09. Wireless Penetration Testing
      • Module 10. IoT Penetration Testing
      • Module 11. OT/SCADA Penetration Testing
      • Module 12. Cloud Penetration Testing
      • Module 13. Binary Analysis and Exploitation
      • Module 14. Report Writing and Post Testing Actions

     

    Prerequisites:

        • Pass the CEH exam
        • Pass the CND exam

    Target Audience:

    Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do.  While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course.  His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.

A large percentage of training is moving to the virtualized/remote lab environments.  Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs.  There were either network connectivity issues, or issues with the remote access software, or other problems.  The whole training experience was very frustrating and not productive.

We keep our labs open to students if they would like after hours, or before hours access.  Repeatedly going through a lab engrains that knowledge for later recall.  Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port.  There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration.  These disaster scenarious requires hands-on physical access to hardware.  Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.