Here are the General Unix course offerings:
Course Overview:
SharePoint is the Premier Office Collaboration Server Suite. Two of the most requested features to implement in any SharePoint Server environment is building custom workflows and incorporating InfoPath forms into the site. This course aims to build the average user’s body of knowledge and skill set to allow them to take on some of this responsibility. Students will learn the SharePoint Designer software, a free product, to do these tasks.
Over the course of the two days the users will work on a live SharePoint Server environments making changes to pages, adding pages and making Workflows. They will learn how to build InfoPath forms and migrate them to the SharePoint environment.
Attendees to TN-5202: Microsoft SharePoint 2010/2013: Workflows and Designing InfoPath Forms will receive TechNow approved course materials and expert instruction.
No Events
Duration: 2 days
Course Objectives:
- Identify the basic features of the SharePoint Designer environment.
- Create a new subsite.
- Add content to a web page.
- Use Cascading Style Sheets to format a SharePoint site.
- Link web pages.
- Add SharePoint components to the site.
- Automate business processes with workflows.
- Create InfoPath forms.
- Import and export forms.
- Customize a form layout.
- Distribute forms.
- Work with a database.
Prerequisites:
- Knowledge of HTML not required, but helpful
- Basic Computer Skills
Comments
Latest comments from students
User: golf123
Instructor comments: Mr. Moore knew and presented the course very well. I would definitely take future courses with TechNow.
Liked the class? Then let everyone know!
Course Overview:
CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions. Cloud Essentials is a vendor-neutral credential designed to validate the candidate has an understanding of basic terms and definitions of cloud computing along with the different processes involved in the successful adoption of cloud computing and its implications for organizations’ use.
TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ curriculum.
Attendees to CT-213: Cloud Essentials+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
Date/Time | Event |
---|---|
06/09/2025 - 06/11/2025 08:00 -16:00 |
CT-213: Cloud Essentials+ TechNow, Inc, San Antonio TX |
10/14/2025 - 10/16/2025 08:00 -16:00 |
CT-213: Cloud Essentials+ TechNow, Inc, San Antonio TX |
Course Duration: 3 days
Course Objectives:
- Domain 1 : Cloud Concepts
- Understand cloud principles
- Identify cloud networking concepts & storage techniques
- Understand cloud design aspects
- Domain 2: Business Principles of Cloud Environments
- Identify and employ appropriate cloud assessments like feasibility studies, benchmarking, or gap analysis
- Highlight key business aspects of cloud vendor relation adoption, and comprehend cloud migration approaches
- Domain 3: Management and Technical Operations
- Explain aspects of operating within the cloud, such as data management or optimization
- Understand the role of DevOps in cloud environments, like API integration or provisioning
- Domain 4: Governance, Risk, Compliance and Security for the Cloud
- Understand risk management and response concepts related to cloud services and identify the importance and impacts of compliance in the cloud, such as regulatory concerns or international standards.
Course Prerequisites:
- CompTIA recommends that a candidate have at least 6 months of experience in an IT environment, with direct involvement in IT-related tasks responsibilities and/or decision making.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This Python for Penetration Testing course is designed to give you the skills you need for maintaining or developing Python Penetration Testing tools oriented towards offensive operations. We have a suite of courses and certifications that help understand a problem, this course prepares the student to rapidly develop prototype code to attack or defend against it.
The course concludes with a Capture the Flag event that will test both your ability to apply your new tools and coding skills in a Python Penetration Testing challenge.
This course is not intended to be an Advanced Python course, but to exemplify penetration techniques utilizing Python. The course covers Threading, Sockets, OOP, and third party modules that facilitate the offensive operator’s objective.
This course utilizes the “Violent Python” text book.
Attendees to TN-345: Python for Penetration Testers Class will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 3 Days
Course Objectives:
- Python Lanuage Refress
- Network Sockets
- Exception Handling
- Hashes and Cracking Passwords
- Threading
- Concepts and Python Implementation
- Queues and Synchronization
- urlparse and httplib to probe URLs
- Crack a password protected zip file
- Port Scanner
- Threading a Port Scanner
- nmap integration
- Deploying shellcode
- Mechanize, BeautifulSoup
- HTTP Form Password Guessing
- HTTP Proxies (Burp Suite)
- HTTP Cookies Session Hijacking
- CookieMonster
- Images and Metadata
- Justniffer
- SQL Injection
- sqlmap
- SQLBrute
- Antivirus and IDS evasion
- PyInstaller
- Metasploit
- Scapy
- Deploy shellcode
- DNS Cache Poisoning
- Packety Violence
Prerequisites:
- Python Programming Skills or P-325: Python Programming
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.
Course Objectives:
- Install and troubleshoot Ansible on central nodes and managed hosts
- Automate administration tasks with Ansible playbooks and ad hoc commands
- Write effective Ansible playbooks
- Protect sensitive data used by tasks with Ansible Vault.
- Install and configure Ansible Tower for enterprise Ansible management
- Use Ansible Tower to control access to inventories and machine credentials by users and teams
- Create job templates in Ansible Tower to standardize playbook execution.
- Centrally launch playbooks and monitor and review job results with Ansible Tower
Course Outline:
- Introduce Ansible
- Deploy Ansible
- Implement playbooks
- Manage variables and inclusions
- Implement task control
- Implement Jinja2 templates
- Implement roles
- Configure complex playbooks
- Implement Ansible Vault
- Troubleshoot Ansible
- Install Ansible Tower and describe Ansible Tower’s architecture
- Create users and teams for role-based access control
- Create and manage inventories and credentials
- Manage projects for provisioning with Ansible Tower
- Construct advanced job workflows
- Update inventories dynamically and compare inventory members
- Maintenance and administration of Ansible Tower
Dates/Locations:
No Events
Duration: 5 Days
Prerequisites:
- Become a Red Hat Certified System Administrator, or demonstrate equivalent experience
Target Audience:
This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.