Here are the CompTIA Security course offerings:
TechNow offers the full gamut of programming languages from ANSI C and C++ to the various Microsoft .Net languages (Visual Basic, C# and C++). If you are completely new to programming, TechNow offers courses that demonstrate the fundamentals to get you started.
If you prefer Unix/Linux, we offer Shell Programming, as well as, Perl and Python. We also offer courses in the web development languages, such as, Java Servlets, JSP, and ASP .Net.
The following is a list of our Programming training courses:
- C-215: Introduction to C Programming
- C-225: C++ Object Oriented Programming
- MS-2124: Programming with C#
- P-245: Programming with PERL
- P-315: Intermediate PERL Programming
- P-325: Python Programming
- P-415: Advanced PERL Programming
- PL-115: Fundamentals of Computer Programming
- TN-215: Shell Programming
- TN-223: Advanced Shell Programming
- TN-345: Python for Penetration Testers
- TN-430: Elasticsearch Engineer (ELK)
- TN-965 Windows Security Automation with Powershell
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
Course Overview:
Intrusion Analyst is a hands-on course that covers intrusion detection in-depth. This includes concepts such as the use of Snort, network traffic analysis, and IDS signatures.
A skills focus enables the student to better absorb the subject matter and perform successfully on the job. This is not death by power point. The course is aligned with information assurance operators and executing hands-on labs. Lecture and labs walk the student through the knowledge required to truly understand the mechanics of packet and intrusion analysis.
Attendees to TN-979: Intrusion Analyst will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Advanced Snort Concepts
- Analyst Toolkit
- Domain Name System (DNS)
- Examining Packet Crafting
- Examining Packet Header Fields
- Fragmentation
- ICMP Theory
- IDS Interoperability
- IDS Patterns
- IDS/IPS Management & Architecture Issues
- Indications, Warnings & Traffic Correlation
- IPv6
- Microsoft Protocols
- Network Traffic Analysis
- NIDS Evasion, Instertion & Checksums
- Snort Fundamentals & Configuration
- Snort GUIs & Sensor Management
- Snort Performance, Active Response & Tagging
- Snort Rules
- Stimulus Response
- TCPdump Fundamentals
- TCP/IP Fundamentals
- Wireshark Fundamentals
- Writing TCPdump Filters
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, Networking, and Security Experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: Tosha
Instructor comments: Dave was an excellent instructor. He is very informative and knowledgeable in the course and the material. I have enjoyed the class and I would take another course with him as the instructor.
Facilities comments: Very nice and clean hotel.
User: buckey26
Instructor comments: Dave was one of the best instructors I have ever had for a tech course. He broke down everything to the point where you can understand it internally.
Liked the class? Then let everyone know!
Course Overview:
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
What’s Included:
- 5 days of instructor-led in classroom training
- Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
- Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
- Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
- CHFI Courseware
- Exam Voucher
- CHFI onsite exam scheduling
Course Objectives:
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
- Identify & check the possible source/ incident origin
- Recover deleted files and partitions in Windows, MAC OS X, and Linux
- Conduct reverse engineering for known and suspected malware files
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Dates/Locations:
| Date/Time | Event |
|---|---|
|
03/23/2026 - 03/27/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
06/29/2026 - 07/03/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
|
09/28/2026 - 10/02/2026 08:00 -16:00 |
TN-415: Computer Hacking Forensics Investigator (CHFI) TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
-
- Module 01. Computer Forensics in Today’s World
- Module 02. Computer Forensics Investigation Process
- Module 03. Understanding Hard Disks and File Systems
- Module 04. Data Acquisition and Duplication
- Module 05. Defeating Anti-forensics Techniques
- Module 06. Operating System Forensics (Windows, Mac, Linux)
- Module 07. Network Forensics
- Module 08. Investigating Web Attacks
- Module 09. Database Forensics
- Module 10. Cloud Forensics
- Module 10. Malware Forensics
- Module 11. Investigating Email Crimes
- Module 12. Investigating Email Crimes
- Module 13. Mobile Forensics
- Module 14. Forensics Report Writing and Presentation
Prerequisites:
-
-
- 2+ years of proven information security work experience
- Educational background with digital security specialization
Target Audience:
-
- Law Enforcement
- Defense & Military
- E-Business Security
- Systems Administrators
- Legal Professionals
- Banking & Insurance professionals
- Government Agencies
- IT Managers
-
-
Comments
Latest comments from students
Liked the class? Then let everyone know!