Course Overview:

The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it.  The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession.  With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.  CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.  This course will help the student prepare to obtain this credential.

Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Information Systems Auditing Process (18%)
    • Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
  • Governance & Management of IT (18%)
    • This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
  • Information Systems Acquisition, Development & Implementation  (12%)
    • Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
  • Information Systems Operation & Business Resilience (26%)
    • Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.s.
  • Protection of Information Assets  (26%)
    • Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

Prerequisites:

A minimum of five years of professional information systems auditing, control & security work experienced is required.  Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.

Comments

Latest comments from students


User: fsarisen

Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


User: storoy30

Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


Liked the class?  Then let everyone Know!

 

Course Overview:

This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms.

TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

Attendees to AZ-400: Microsoft Azure DevOps Solutions will receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Course Duration: 5 days

Course Outline:

  • Planning for DevOps
  • Getting started with Source Control
  • Scaling Git for enterprise DevOps
  • Consolidating Artifacts & Designing a Dependency Management Strategy
  • Implementing Continuous Integration with Azure Pipelines
  • Managing Application Config and Secrets
  • Managing Code Quality and Security Policies
  • Implementing a Container Build Strategy
  • Manage Artifact versioning, security & compliance
  • Design a Release Strategy
  • Set up a Release Management Workflow
  • Implement an appropriate deployment pattern
  • Implement process for routing system feedback to development teams
  • Implement a mobile DevOps strategy
  • Infrastructure and Configuration Azure Tools
  • Azure Deployment Models and Services
  • Create and Manage Kubernetes Service Infrastructure
  • Third Party Infrastructure as Code Tools available with Azure
  • Implement Compliance and Security in your Infrastructure
  • Recommend and design system feedback mechanisms
  • Optimize feedback mechanisms

Prerequisites :

      • AZ-900: Microsoft Azure Fundamentals
      • Fundamental knowledge about Azure, version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software.

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

We are often asked what is the recommended sequence of classes.  Here is our recommended sequence of classes for The Security Field.

Certified Information Security Manager (CISM)

CT-325 CompTIA Security+ Arrowright TN-825 Certified Information Security Manager

Certified Information Systems Auditor(CISA)

CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-822: Certified Information Systems Auditor (CISA)

Certified Information Systems Security Professional(CISSP)

CT-325 CompTIA Security+ Arrowright TN-425 Certified Ethical Hacker Arrowright TN-815 CISSP Certification Prep Seminar

 

Course Overview:

This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment.  It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements.  The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and  40% lab time.

Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Overview of Business Analysis Workshop
  • Eliciting Project Workshop
  • Case Study
  • Analyzing Requirements and Writing Case Studies
  • Case Study

Prerequisites:

  • None

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

 

Course Overview:

Every programmer must keep up with the latest tools and techniques. This course will help you push your skills to the next level and become a more accomplished programmer.  Advanced PERL Programming teaches you all the complex techniques for production-ready PERL programs and explains concepts such as introspection, overriding built-ins, extending PERL's OO model, and testing your code for greater stability.

Attendees to P-415: Advanced PERL Programming will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Advanced Techniques
  • Parsing Techniques
  • Templating Tools
  • Objects, Databases, and Applications
  • Natural Language Tools
  • PERL and Natural Languages
  • Handling English Text
  • Modules for Parsing English
  • Categorization and Extraction
  • PERL and Unicode
  • POE
  • Programming in an Event-Driven Environment
  • Testing
  • Keeping Tests and Code Together
  • Inline Extensions
  • Just Another PERL Hacker

Prerequisites:

 

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!