Here are the General Unix course offerings:
Course Overview:
Red Hat System Administration: Linux Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration. TechNow’s Ansible course facilitates the dynamic IT infrastructure through automation.
This course also supports DevOps practices through Ansible playbooks automating workflows. TechNow has operated Automated Unix and Linux environment for over 35 years and brings this field experience to the classroom utilizing ansible and discussing its impact on: Infrastructure (Linux, Windows, network devices), Cloud automation (AWS and Azure), Application deployment, Security & compliance, and CI/CD pipelines.
This course also ties in nicely with the TechNow course CL-355: Containers, Kubernetes, and Red Hat OpenShift Administration which provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1).
Dates/Locations:
Duration: 5 days
Course Objectives:
- An introduction to Ansible
- Install and configure Ansible development tools in VS Code and configure Ansible setting
- Create and update inventories of managed hosts and manage connections to them
- Automate administration tasks with Ansible Playbooks
- Write effective playbooks at scale
- Protect sensitive data used by Ansible Automation Platform with Ansible Vault
- Reuse code and simplify playbook development with Ansible Roles and Ansible Content Collections
- Developing Automation Content: Variables, Task Control, Deploying Files
- Developing Automation Content at Scale
- Reusing Code with Ansible Roles and Content Collections
- Automate Linux Administration Tasks
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers. CGRC is crucial to the Management staff.
This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.
TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:
- Security and Privacy Governance, Risk Management, and Compliance Program
- Scope of the System
- Selection and Approval of Framework, Security, and Privacy Controls
- Implementation of Security and Privacy Controls
- Assessment/ Audit of Security and Privacy Controls
- System Compliance
- Compliance Maintenance
RMF Related Steps
- Prepare – Process Initiation
- Categorize Information Systems
- Establish the Security Control Baseline
- Apply Security Controls
- Assess Security Controls
- Authorize Information System
- Monitor Security Controls
TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.
Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
05/26/2026 - 05/29/2026 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC)</a> TechNow, Inc, San Antonio TX |
|
09/08/2026 - 09/11/2026 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- Initiate the Preparation Phase
- Perform Execution Phase
- Perform Maintenance Phase
- Understand the Purpose of Security Authorization
Prerequisites:
- IT Security
- Information Assurance
- Information Risk Management certification and systems administration
- 1-2 years of general experience technical experience
- 2 years of general systems experience
- 1-2 years of Database/Systems Development/Network Experience
- Information Security Policy Experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.
NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment
Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.
Date/Locations:
| Date/Time | Event |
|---|---|
|
08/03/2026 - 08/04/2026 08:00 -16:00 |
AZ-900: Microsoft Azure Fundamentals TechNow, Inc, San Antonio TX |
|
11/09/2026 - 11/10/2026 08:00 -16:00 |
AZ-900: Microsoft Azure Fundamentals TechNow, Inc, San Antonio TX |
Course Duration: 3 days
Course Outline:
- Cloud Concepts
- Core Azure Services
- Security, Privacy, Compliance, And Trust
- Azure Pricing and Support
Lab Objectives:
-
- Create a virtual machine
- Deploy Azure container instances
- Create a virtual network
- Create blob storage
- Create a SQL database
- Implement an Azure IoT Hub
- Implement Azure Functions
- Create a web app
- Create a VM with a Template
- Create a VM with PowerShell
- Create a VM with CLI
- Secure network traffic
- Implement Azure key vault
- Create an Azure Policy
- Manage access with RBAC
- Manage resource locks
- Implement resource tagging
- Exploring the Trust Center
- Use the Azure Pricing Calculator
- Use the Azure TCO Calculator
- Open a Support request
- Calculate composite SLAs
- Access Azure Preview features
Prerequisites :
-
-
- There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
- This course is suitable for IT personnel who are just beginning to work with Azure.
- This course primarily uses the Azure portal to create services and does not require scripting skills.
- Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
- This course provides an Azure pass and optional lab environment.
-
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.
Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.
Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Introduction to Privacy Program Management
- Module 2: Privacy Governance
- Module 3: Applicable Laws and Regulations
- Module 4: Data Assessments
- Module 5: Policies
- Module 6: Data Subjects’ Rights
- Module 7: Training and Awareness
- Module 8: Protecting Personal Information
- Module 9: Data Breach Incident Plans
- Module 10: Measuring, Monitoring and Auditing Program Performance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students