Course Overview:

Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

What’s Included:

  • Authorized courseware
  • Exam voucher
  • IAPP membership

**GDPR Regulation Mandated May 25, 2018**

Course Objectives:

Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.

Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 2 Days

Course Content:

  • Module 1: Data Protection Laws
  • Module 2: Personal Data
  • Module 3: Controllers and Processors
  • Module 4: Processing Personal Data
  • Module 5: Information Provision
  • Module 6: Data Subjects’ Rights
  • Module 7: Security of Processing
  • Module 8: Accountability
  • Module 9: International Data Transfers
  • Module 10: Supervisions and Enforcement
  • Module 11: Compliance.

 

Prerequisites: None

Target Audience:

Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

The  UNIX Security Administrator Prep is a hands-on course that covers how to secure and audit UNIX and Linux operating systems. This includes concepts such as Rootkits, Buffer overflows, and monitoring UNIX/Linux systems.

Attendees to TN-959: Unix Security Administratorwill receive TechNow approved course materials and expert instruction.

Date/Locations:

No Events

Duration: 5 days

Course Objectives:

  • AIDE
  • Apache
  • Best Practices for Kernel Tuning and Warning Banners
  • Boot Services
  • Chroot()
  • DNS- BIND
  • DNSSec
  • Evidence Collection and Preservation
  • Forensic Analysis
  • Forensic Preparation and Incident Handling
  • Host Based Firewalls – iptables
  • Intro to Forensics
  • OS Install and Patching
  • Physical, User Account, and Password Access Control
  • Se Linux
  • Sendmail
  • SSH
  • Stack Smashing
  • Sudo
  • Syslog-NG
  • UNIX Logging

Course Prerequisites:

  • GSEC or equivalent experience
  • UNIX, Windows, networking, and security experience
  • This is a hands-on skill course requiring comfort with command line interaction and network communications

 

Comments

Latest comments from students


User: wbcarter

Instructor comments: Good Stuff. Thanks!


User: ryuhas

Instructor comments: Very Good Instructor

Facilities comments: Facilities was great. Location had a lot to be desired. To much traffic and accidents trying to get here.


Liked the class?  Then let everyone know!

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • N-305: CCNA Bootcamp
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 08/11/2025 – 08/13/2025
    • San Antonio
  • TN-555: Certified Ethical Hacker v13 (CEH)
    • 08/11/2025 – 08/15/2025
    • San Antonio
  • CT-325: Security+
    • 08/18/2025 – 08/22/2025
    • San Antonio
  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • in   

    Course Overview:

    This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.

    Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Advanced Hash Manipulation
    • Command Shell vs. Terminal Access
    • Enumerating Users
    • Exploitation Fundamentals
    • Injection Attacks
    • Legal Issues
    • Metasploit
    • Moving Files with Exploits
    • Obtaining and Passing Password Representations
    • Overview of Passwords
    • Penetration Testing Foundations
    • Penetration Testing Process
    • Penetration Testing via the Command Line
    • Profiling the Target
    • Reconnaissance
    • Scanning for Targets
    • Using a Proxy to Attack a Web Application
    • Vulnerability Scanning
    • Wireless Crypto and Client Attacks
    • Wireless Fundamentals

    Course Prerequisites:

    • GSEC or equivalent experience
    • UNIX, Windows, networking, and security experience
    • This is a hands-on skill course requiring comfort with command line interaction and network communications

    Comments

    Latest comments from students



    User: kdwagoner

    Instructor comments: Very knowledgeable. Kept class focused and on task

    Facilities comments: Good


    Liked the class?  Then let everyone know!

     


    Course Overview:

    This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.

    Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.

    This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

    You will learn how to protect, detect and respond to, and predict threats on the network.  This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.

    You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.

    This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

     

    What’s Included:

    • EC-Council official E-Courseware
    • EC-Council iLabs access included for 6 months
    • EC-Council official Certificate of Attendance
    • CND Exam Voucher with 1 FREE RETAKE VOUCHER

     

    Security Course Flow
    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    09/15/2025 - 09/19/2025
    08:00 -16:00
    TN-545: Certified Network Defender
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Content:

    • Module 01. Network and Defense Strategies
    • Module 02. Administrative Network Security
    • Module 03. Technical Network Security
    • Module 04. Network Perimeter Security
    • Module 05. Endpoint Security-Windows Systems
    • Module 06. Endpoint Security- Linux Systems
    • Module 07. Endpoint Security- Mobile Devices
    • Module 08. Endpoint Security- IoT Devices
    • Module 09. Administrative Application Security
    • Module 10. Data Security
    • Module 11. Enterprise Virtual Network Security
    • Module 12. Enterprise Cloud Network Security
    • Module 13. Enterprise Wireless Network Security
    • Module 14. Network Traffic Monitoring and Analysis
    • Module 15. Network Logs Monitoring and Analysis
    • Module 16. Incident Response and Forensic Investigation
    • Module 17. Business Continuity and Disaster Recovery
    • Module 18. Risk Anticipation with Risk Management
    • Module 19. Threat Assessment with Attack Surface Analysis
    • Module 20. Threat Prediction with Cyber Threat Intelligence

     

    Prerequisites:

    • Basic network and host operations knowledge
    • Experience commensurate with one to five years of network, host, or application administration
    • TN-325:Security+   or equivalent

     

    Courses to follow:

     

    Target Audience:

    Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations

     

    About us:

    TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

    Tech Now, Inc. is an accredited Training Center with Ec-Council.

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!