1. SCOPE

a. The Contractor shall provide training courses normally available to commercial customers, which will permit Government users to make full, efficient use of general purpose commercial IT products. Training is restricted to training courses for those products within the scope of this solicitation.
b. The Contractor shall provide training at the Contractor’s facility and/or at the Government’s location, as agreed to by the Contractor and the Government.

2. ORDER

Written orders, EDI orders (GSA Advantage! and FACNET), credit card orders, and orders placed under blanket purchase agreements (BPAs) shall be the basis for the purchase of training courses in accordance with the terms of this contract. Orders shall include the student’s name, course title, course date and time, and contracted dollar amount of the course.

3. TIME OF DELIVERY
The Contractor shall conduct training on the date (time, day, month, and year) agreed to by the Contractor and the Government.

4. CANCELLATION AND RESCHEDULING

a. The Government will notify the Contractor at least seventy-two (72) hours before the scheduled training date, if a student will be unable to attend. The Contractor will then permit the Government to either cancel the order or reschedule the training at no additional charge. In the event the training class is rescheduled, the Government will modify its original training order to specify the time and date of the rescheduled training class.
b. In the event the Government fails to cancel or reschedule a training course within the time frame specified in paragraph a, above, the Government will be liable for the contracted dollar amount of the training course. The Contractor agrees to permit the Government to reschedule a student who fails to attend a training class within ninety (90) days from the original course date, at no additional charge.
c. The Government reserves the right to substitute one student for another up to the first day of class.
d. In the event the Contractor is unable to conduct training on the date agreed to by the Contractor and the Government, the Contractor must notify the Government at least seventy-two (72) hours before the scheduled training date.

5. FOLLOW-UP SUPPORT

The Contractor agrees to provide each student with unlimited telephone support for a period of one (1) year from the completion of the training course. During this period, the student may contact the Contractor’s instructors for refresher assistance and answers to related course curriculum questions.

6. PRICE FOR TRAINING

The price that the Government will be charged will be the Government training price in effect at the time of order placement, or the Government price in effect at the time the training course is conducted, whichever is less.

7. INVOICES AND PAYMENT

Invoices for training shall be submitted by the Contractor after Government completion of the training course. Charges for training must be paid in arrears (31 U.S.C. 3324). PROMPT PAYMENT DISCOUNT, IF APPLICABLE, SHALL BE SHOWN ON THE INVOICE.

8. FORMAT AND CONTENT OF TRAINING

a. The Contractor shall provide written materials (i.e., manuals, handbooks, texts, etc.) normally provided with course offerings. Such documentation will become the property of the student upon completion of the training class.
b. For hands-on training courses, there must be a one-to-one assignment of IT equipment to students.
c. The Contractor shall provide each student with a Certificate of Training at the completion of each training course.
d. The Contractor shall provide the following information for each training course offered:
(1) The course title and a brief description of the course content, to include the course format (e.g., lecture, discussion, hands-on training);
(2) The length of the course;
(3) Mandatory and desirable prerequisites for student enrollment;
(4) The minimum and maximum number of students per class;
(5) The locations where the course is offered;
(6) Class schedules; and
(7) Price (per student, per class (if applicable).

INFORMATION APPLICABLE TO ALL COURSES:

The format of all courses will include lecture, discussion and hands-on training.(4) Minimum Number of Students: one for courses at TechNow Training Facilities, ten for courses at the client’s facility; Maximum Number of Students: twelve, for courses at TechNow and client facilities.

(5) LOCATIONS:

San Antonio Office
14117 Jones Maltsberger Rd.
San Antonio, TX 78247
Toll Free: 800-324-2294
Telephone: 210-733-1093
Fax: 210-733-6032

 

in   
 

Course Overview:

This course teaches students how to use the powerful PERL programming language, focusing on hands-on labs to promote retention & challenge students to apply their skills to new situations. PERL is a flexible, easy to use language suitable for many tasks such as system administration, web applications & database integration. System administrators, web programmers & database administrators will benefit from mastering this powerful programming language. This course reviews & builds on the information presented in PL-115: Fundamentals of Computer Programming.

Attendees to P-245: Programming with PERL will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Course Duration: 5 days

Course Objectives:

  • Introduction
  • Scalar Data
  • Lists & Arrays
  • Subroutines
  • Input & Output
  • Hashes
  • In the World of Regular Expressions
  • Matching with Regular Expressions
  • Processing Text with Regular Expressions
  • More Control Structures
  • File Tests
  • Directory Operations
  • Strings & Sorting
  • Process Management
  • PERL Modules
  • Some Advanced PERL Techniques

Prerequisites:

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

 

Course Overview:

TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers.  CGRC is crucial to the Management staff.

This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.

TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:

  • Security and Privacy Governance, Risk Management, and Compliance Program
  • Scope of the System
  • Selection and Approval of Framework, Security, and Privacy Controls
  • Implementation of Security and Privacy Controls
  • Assessment/ Audit of Security and Privacy Controls
  • System Compliance
  • Compliance Maintenance

RMF Related Steps

  • Prepare – Process Initiation
  • Categorize Information Systems
  • Establish the Security Control Baseline
  • Apply Security Controls
  • Assess Security Controls
  • Authorize Information System
  • Monitor Security Controls

TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.

Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.

Dates/Locations:

Date/Time Event
09/08/2025 - 09/11/2025
08:00 -16:00
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX

Duration: 3 Days

Course Objectives:

  • Initiate the Preparation Phase
  • Perform Execution Phase
  • Perform Maintenance Phase
  • Understand the Purpose of Security Authorization

Prerequisites:

  • IT Security
  • Information Assurance
  • Information Risk Management certification and systems administration
  • 1-2 years of general experience technical experience
  • 2 years of general systems experience
  • 1-2 years of Database/Systems Development/Network Experience
  • Information Security Policy Experience

Comments

Latest comments from students




Liked the class?  Then let everyone know!

Basic Information:

Contract Number: GS-35F-0365L Period Covered: April 24, 2001 to April 23, 2021

Products and ordering information is in this Authorized FSS Information Technology Schedule. Price List’s are also available on the GSA Advantage! System. Agencies can browse GSA Advantage! by accessing the Federal Supply Service’s Home Page via the Internet at GSA.gov.

in   

 

 

 

 

 

 

 

Course Overview:

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

The CHFI certification gives participants the necessary skills to perform an effective digital forensics investigation. CHRI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence

What’s Included:

  • 5 days of instructor-led in classroom training
  • Detailed Labs for hands-on learning experience; approximately 50% of training is dedicated to labs
  • Hundreds of investigation tools including EnCase, Access Data FTL, & ProDiscover
  • Huge cache of evidence files for analysis including RAW, .dd images, video & audio files, MS Office files, systems files, etc.
  • CHFI Courseware
  • Exam Voucher
  • CHFI onsite exam scheduling

Course Objectives:

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
  • Identify & check the possible source/ incident origin
  • Recover deleted files and partitions in Windows, MAC OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Dates/Locations:

No Events

Duration: 5 Days

Course Content:

    • Module 01. Computer Forensics in Today’s World
    • Module 02. Computer Forensics Investigation Process
    • Module 03. Understanding Hard Disks and File Systems
    • Module 04. Data Acquisition and Duplication
    • Module 05. Defeating Anti-forensics Techniques
    • Module 06. Operating System Forensics (Windows, Mac, Linux)
    • Module 07. Network Forensics
    • Module 08. Investigating Web Attacks
    • Module 09. Database Forensics
    • Module 10. Cloud Forensics
    • Module 10. Malware Forensics
    • Module 11. Investigating Email Crimes
    • Module 12. Investigating Email Crimes
    • Module 13. Mobile Forensics
    • Module 14. Forensics Report Writing and Presentation

 

Prerequisites:

      • 2+ years of proven information security work experience
      • Educational background with digital security specialization

    Target Audience:

      • Law Enforcement
      • Defense & Military
      • E-Business Security
      • Systems Administrators
      • Legal Professionals
      • Banking & Insurance professionals
      • Government Agencies
      • IT Managers

  • Comments

    Latest comments from students


    Liked the class?  Then let everyone know!