TechNow offers Government Services Administration training ( GSA training ) for you or your group.

Course Code COURSE DESCRIPTION GSA PRICE
C-215 C-215: Intro to C Programming $1,623.85
C-225 C-225: C++ Object Oriented Programming $1,623.85
CT-205 CT-205: A+ Certification Course $1,850.00
CT-225 CT-225: Network+ $1,800.00
CT-325 CT-325: Security+ $1,800.00
J-115 J-115: Introduction to Java Programming $1,683.85
J-215 J-215: Advanced Java Programming $1,786.64
L-245 L-245: Linux System Administration I $2,030.83
L-295 L-295: Linux System Administration II $2,030.83
MS-2272 MS-2272: Implementing and Supporting Microsoft Windows XP Professional $1,546.52
MS-2273 MS-2273: Managing and Maintaining a Microsoft Windows Server 2003 Environment $1,546.52
MS-2277 MS-2277: Implementing, Managing and Maintaining a Microsoft Windows Server 2003: Network Infrastructure: Network Services $1,546.52
MS-2278 MS-2278: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure $1,546.52
MS-2279 MS-2279: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure $1,546.52
MS-2282 MS-2282: Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure $1,546.52
MS-2823 MS-2823: Implementing and Administering Security in a Microsoft Windows Server 2003 Network $1,546.52
N-305 N-305: Interconnecting Cisco Network Devices 2 $2,083.83
N-405 N-405: ROUTE-Implementing Cisco IP Routing v1.0 $2,083.83
N-415 N-415: Implementing Cisco Switched Networks v1.0 $2,083.83
N-435 N-435: Troubleshooting and Maintaining Cisco IP Networks v1.0 $2,083.83
N-445 N-445: Cisco IP Telephony $2,199.12
OR-415 OR-415: Oracle Systems Administration for Unit Level TBmcS Administrators $1,791.12
OR-425 OR-425: Oracle 10g: Administration Workshop I $1,800.00
OR-435 OR-435: Oracle 10g: Administration Workshop II $1,800.00
P-245 P-245: Programming with PERL $1,623.85
P-315 P-315: Intermediate Perl Programming $1,786.64
PL-115 PL-115: Fundamentals of Computer Programming $1,623.85
S-245 S-245: Solaris System Administration I $2,030.83
S-295 S-295: Solaris 2.x System Administration II $2,030.83
TN-125 TN-125: Introduction to UNIX and Linux* $1,868.04
TN-215 TN-215: Shell Programming $1,623.85
TN-223 TN-223: Advanced Shell Programming $1,220.94
TN-315 TN-315: Complete Hack & Defend $2,112.23
TN-325 TN-325: VoIP Security Analysis and Design $2,396.00
TN-385 TN-385: TCP/IP Analysis & Implementation $2,396.00
TN-425 TN-425: Certified Ethical Hacker $2,112.00
TN-715 TN-715: Systems Security Certified Practitioner $2,076.00
TN-802 TN-802: Federal Information Security Management Act (FISMA) Seminar $1,000.00
TN-804 TN-804: Corporate Risk Management $1,756.00
TN-815 TN-815: CISSP Certification Preparation Seminar $2,112.23
TN- 822 TN-822: Certified Information Systems Auditor (CISA) Seminar $2,076.00
TN- 825 TN-825: Certified Information Security Manager (CISM) Seminar $2,076.00
WW-112 WW-112: Introduction to XML $728.49
WW-313 WW-313: XML Programming Using Java $1,216.87

 

in   

Course Overview:

This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP®-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

Attendees to TN-812: Information Systems Secuirty Engineering Professional (ISSEP) will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Systems Security Engineering
  • Certification and Accreditation
  • Technical Management
  • U.S. Government Information Assurance Governance

Prerequisites:

Comments

Latest comments from students


User: fsarisen

Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


User: storoy30

Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


Liked the class?  Then let everyone know?

Course Overview:

This CEH course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems. CEH shows how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.

This CEH course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

This CEH course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker (CEH) certification exam (312-50) from EC-Council.

This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

What’s Included:

  • EC-Council official E-Courseware
  • EC-Council official iLabs code with access for 6 months
  • EC-Council official Certificate of Attendance
  • CEH Exam Voucher

 

Security Course Flow
Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
04/29/2024 - 05/03/2024
08:00 -16:00
TN-555: Certified Ethical Hacker v12
TechNow, Inc, San Antonio TX
08/26/2024 - 08/30/2024
08:00 -16:00
TN-555: Certified Ethical Hacker v12
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Content:

  • Module 01. Introduction to Ethical Hacking
  • Module 02. Foot-printing and Reconnaissance
  • Module 03. Scanning Networks
  • Module 04. Enumeration
  • Module 05. Vulnerable Analysis
  • Module 06. System Hacking
  • Module 07. Malware Threats
  • Module 08. Sniffing
  • Module 09. Social Engineering
  • Module 10. Denial-of-Service
  • Module 11. Session Hijacking
  • Module 12. Evading IDS,Firewalls, and Honeypots
  • Module 13. Hacking Web Servers
  • Module 14. Hacking Web Applications
  • Module 15. SQL Injection
  • Module 16. Hacking Wireless Networks
  • Module 17. Hacking Mobile Platforms
  • Module 18. IoT and OT Hacking
  • Module 19. Cloud Computing
  • Module 20. Cryptography

 

Prerequisites:

  • Windows operating system and/or Linux operating system or other Unix-based OS
  • TCP/IP protocols and implementation
  • At least 2 years of IT security experience
  • TN-325:Security+

Target Audience:

Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team,Risk/Threat/Vulnerability Analyst, Individuals concerned about the integrity of network infrastructure

 

About us:

TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview: 

In this course, you will learn how to enhance the security of the IT infrastructure that you administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already and then teaches you how to protect administrative credentials and rights to ensure that administrators can perform the precise tasks they need at any time, when they need to.

This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.

 

Attendees to TN-765: Securing Windows Server 2016 will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

 

  • Secure Windows Server
  • Protect credentials and implement privileged access workstations
  • Limit administrator rights with Just Enough Administration
  • Manage privileged access
  • Mitigate malware and threats
  • Analyze activity with advanced auditing and log analytics
  • Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite
  • Configure Guarded Fabric virtual machines (VMs)
  • Use the Security Compliance Toolkit (SCT) and containers to improve security
  • Plan and protect data
  • Optimize and secure file services
  • Secure network traffic with firewalls and encryption
  • Secure network traffic by using DNSSEC and Message Analyzer

 

 

Course Prerequisites:

  • A solid, practical understanding of Active Directory Domain Services (AD DS) principles
  • A solid, practical understanding of Microsoft Hyper-V virtualization fundamentals
  • A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS)
  • An understanding of Windows Server security principles

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:

This FastTrack course combines combines two VMware courses (VMware Cloud Essentials and vCloud Architecting the VMware Cloud) into a single week course that adds extra exercises and labs to exemplify the techniques presented.  The course begins with how to adopt, operate, and govern the cloud. The course enables participants to successfully complete the associated CompTIA Cloud Essentials™ Exam to become a Cloud Essentials™ Professional(CEP). This course also covers the subject matter specified by the VCP-Cloud certification.

This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud environment. Detailed labs and exercises for VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. A comprehensive VMware cloud design is demonstrated and discussed.

Attendees to VM-335:  VMware Cloud Essentials and vCloud – Architecting the VMware Cloud FastTrack will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Understand the common terms and definitions of cloud computing.
  • Understand the business benefits and business considerations of cloud computing.
  • Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
  • Understand the impact and changes of cloud computing on IT service management.
  • Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
  • Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
  • Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
  • Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
  • Design a network infrastructure optimized for vCloud.
  • Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security rolesnderstand the common terms and definitions of cloud computing.
  • Understand the business benefits and business considerations of cloud computing.
  • Understand cloud computing from a technical perspective and recognize the various techniques, methods, challenges, and types of clouds.
  • Understand the impact and changes of cloud computing on IT service management.
  • Explain typical steps that lead to the successful adoption of cloud computing and understand the implications for organizations.
  • Recognize the compliance, risk, and regulatory consequences of cloud computing and its financial and strategic impact on an organization.
  • Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs.
  • Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources.
  • Design a network infrastructure optimized for vCloud.
  • Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles.
  • Design a vCenter Chargeback implementation.

Course Prerequisites:

  • VM-315  or equivalent experience.
  • Managing or administering at least one of UNIX, Windows, databases, networking, or security.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!