This class uses a sample product development initiative to illustrate the course principles. If you need to learn what is required to lead or participate in an Agile effort using the SCRUM approach within your organization, this course will cover the Agile adaptive life cycle framework and all of the ceremonies, artifacts, and roles.
Attendees to PM-222: Agile Principles using will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 2 Days
Course Objectives: At the conclusion of this course, students will be able to:
Compare the Agile (adaptive) and Plan Driven (predictive/ waterfall) approaches
Understand the Agile Manifesto and SCRUM Framework
Apply the basics of Agile / SCRUM Team Organization, with importance of the Development Team responsibilities
Use Agile / SCRUM chartering, high-level estimating, and prioritization techniques to initiate a Product Roadmap and a Product Backlog
Create personas and user stories to lead to Development Team task assignments
Understand Release and Sprint Planning to lead to the Sprint Backlog
Plan and conduct a sample SCRUM Sprint from the Vision Statement through the Sprint retrospective
Target Student:
Designed specifically for Agile project team members, product owners, project leaders and senior managers or anyone wanting to understand the Agile Framework.
This course provides students with the knowledge and skills to implement a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to implementing a database.
Attendees to MS-6232: Implementing a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
Creating Databases and Databases Files
Creating Data Types and Tables
Creating and Tuning Indexes
Implementing Data Integrity by Using Constraints and Triggers
Using XML
Implementing Views
Implementing Stored Procedures
Implementing Functions
Implementing Managed Code in the Database
Managing Transactions and Locks
Using Service Broker
Prerequisites:
Basic knowledge of the Microsoft Windows operating system and its core functionality
Working knowledge of Transact-SQL
Working knowledge of relational databases
Some experience with database design
Comments
Latest comments from students
User: bangbangsplat
Instructor comments: some kind of presentation would have been helpful in learning the objectives of the course (PowerPoint, drawing on easel, etc.) It seemed like the instructor is not too familiar with the error codes we were receiving during the Practice Exams.
Facilities comments: preferred to have the location located in a less busy area of the city
User: smaxam
Instructor comments: Clay was very knowledgable but had to repeat questions a number of times to get his attention.
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.
Through an introduction to Docker, Kubernetes, and Red Hat OpenShift Platform, this training course helps you understand one of the key tenets of the DevOps and DevSecOps Platform (DSOP) movement: continuous integration and continuous deployment. The CI/CD pipeline becomes well understood and implemented in an open architecture. Containers have become a key technology for the configuration and deployment of applications and micro services. Kubernetes is a container orchestration platform that provides foundational services in Red Hat OpenShift Container Platform, which allows enterprises to manage container deployments and scale their applications using Kubernetes.
This training course provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1). Workflows of the DoD Iron Bank container repository are introduced, along with an overview of the DoD Pipeline as represented in Big Bang. Continuous authorization cATO via Party Bus within NIST RMF is presented. You will become aware of the Platform One (P1) integrations and relationship to Docker, Kubernetes, Istio (Red Hat OpenShift Service Mesh) and Red Hat OpenShift Platform.
In addition to gaining an understanding of these tools, you will build core administration skills through the installation, configuration, and management of an OpenShift cluster and containerized applications.
Course Objectives:
Learn about Containers, Docker, Kubernetes, and OpenShift architecture