Course Overview:
This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam from EC-Council.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.
What’s Included:
- EC-Council official E-Courseware
- EC-Council official iLabs code with access for 6 months
- EC-Council official Certificate of Attendance
- CEH Exam Voucher
Security Course Flow
Dates/Locations:
Duration: 5 Days
Course Content:
- Module 01. Introduction to Ethical Hacking
- Module 02. Foot-printing and Reconnaissance
- Module 03. Scanning Networks
- Module 04. Enumeration
- Module 05. Vulnerable Analysis
- Module 06. System Hacking
- Module 07. Malware Threats
- Module 08. Sniffing
- Module 09. Social Engineering
- Module 10. Denial-of-Service
- Module 11. Session Hijacking
- Module 12. Evading IDS,Firewalls, and Honeypots
- Module 13. Hacking Web Servers
- Module 14. Hacking Web Applications
- Module 15. SQL Injection
- Module 16. Hacking Wireless Networks
- Module 17. Hacking Mobile Platforms
- Module 18. IoT and OT Hacking
- Module 19. Cloud Computing
- Module 20. Cryptography
Prerequisites:
- Windows operating system and/or Linux operating system or other Unix-based OS
- TCP/IP protocols and implementation
- At least 2 years of IT security experience
- TN-325:Security+
Target Audience:
Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.
Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers. CGRC is crucial to the Management staff.
This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.
TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:
- Security and Privacy Governance, Risk Management, and Compliance Program
- Scope of the System
- Selection and Approval of Framework, Security, and Privacy Controls
- Implementation of Security and Privacy Controls
- Assessment/ Audit of Security and Privacy Controls
- System Compliance
- Compliance Maintenance
RMF Related Steps
- Prepare – Process Initiation
- Categorize Information Systems
- Establish the Security Control Baseline
- Apply Security Controls
- Assess Security Controls
- Authorize Information System
- Monitor Security Controls
TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.
Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.
Dates/Locations:
Date/Time |
Event |
01/21/2025 - 01/24/2025
08:00 -16:00
|
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX
|
03/31/2025 - 04/04/2025
08:00 -16:00
|
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX
|
05/28/2025 - 05/30/2025
08:00 -16:00
|
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX
|
09/08/2025 - 09/11/2025
08:00 -16:00
|
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX
|
Duration: 3 Days
Course Objectives:
- Initiate the Preparation Phase
- Perform Execution Phase
- Perform Maintenance Phase
- Understand the Purpose of Security Authorization
Prerequisites:
- IT Security
- Information Assurance
- Information Risk Management certification and systems administration
- 1-2 years of general experience technical experience
- 2 years of general systems experience
- 1-2 years of Database/Systems Development/Network Experience
- Information Security Policy Experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
Course Overview:
This course will provide students with proficiency in the everyday management of Linux based clients and basic management of server system. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux based clients, server systems and security. Let us help you prepare for the CompTIA Linux+ exam (XK0-005).
TechNow is a CompTIA partner and uses official CompTIA Linux+ curriculum.
Attendees to CT-245: Linux+ will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Date/Time |
Event |
02/03/2025 - 02/07/2025
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
05/12/2025 - 05/16/2025
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
08/25/2025 - 08/29/2025
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
12/01/2025 - 12/05/2025
08:00 -16:00
|
CT-245: Linux+
TechNow, Inc, San Antonio TX
|
Duration: 5 Days
Course Objectives:
- Perform basic Linux tasks
- Manage users and groups
- Manage permissions and ownership
- Manage storage
- Manage files and directories
- Manage kernel modules
- Manage the Linux boot process
- Manage system components
- Manage devices
- Manage networking
- Manage packages and software
- Secure Linux systems
- Write and execute Bash shell scripts
- Automate tasks
- Plan and perform a Linux installation
Prerequisites:
Comments
Latest comments from students
User: cwbrind
Instructor comments: Great experience with Mr. Peterson, would recommend again. Highly knowledgable and approachable for any subject.
Facilities comments: The Holiday Inn was a nice location for learning despite traffic around the area.
Liked the class? Then let everyone know!
Course Overview:
This bootcamp is a customized course for Cloud Essentials+ and Cloud+ that leverages 8 days to provide greater value than just the delivery of two separate courses. The 8 days of instruction prepare the student for the CCSP course.
TechNow has Identified overlap and uses time saved to:
- Introduce hands-on skills (Open Source and AWS)
- Go more in-depth on theory using hands-on to reinforce concepts
- Do exam prep with practice questions
This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.
This bootcamp helps prepare students for 2 certifications, CompTIA Clouds Essentials+ and CompTIA Cloud+. After this course students will also be prepared to continue their education by taking CL-315: CCSP – Certified Cloud Security Professional Preparation Seminar .
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ and CompTIA Cloud+ curriculum.
Attendees to CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 8 days
Course Objectives:
- Learn the fundamental concepts of cloud computing
- Learn the business aspects and impacts of cloud computing
- Differentiate the types of cloud solutions and the adoptions measures for each
- Identify the technical challenges and the mitigation measures involved in cloud computing
- Identify the technical challenges and the mitigation measures involved in cloud computing
- Identify the steps to successfully adopt cloud services
- Identify the basic concepts of ITIL and describe how the ITIL framework is useful in the implementation of cloud computing in an organization
- Identify the possible risks involved in cloud computing and the risk mitigation measures, and you will also identify the potential cost considerations for the implementation of cloud and its strategic benefits
- Prepare to deploy cloud solutions
- Deploy a pilot project
- Test a pilot project deployment
- Design a secure network for cloud deployment
- Determine CPU and memory sizing for cloud deployments
- Plan Identity and Access Management for cloud deployments
- Analyze workload characteristics to ensure successful migration to the cloud
- Secure systems to meet access requirements
- Maintain cloud systems
- Implement backup, restore, and business continuity measures
- Analyze cloud systems for required performance
- Analyze cloud systems for anomalies and growth forecasting
- Troubleshoot deployment, capacity, automation, and orchestration issues
- Troubleshoot connectivity issues
- Troubleshoot security issues
Course Prerequisites:
- Security+, Network+ or equivalent experience
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
Liked the class? Then let everyone know!