Here are the CompTIA Security course offerings:
Course Overview:
The HCISPP is the only certification that combines cybersecurity skills with privacy best practices and techniques. It demonstrates you have the knowledge and ability to implement, manage, and assess security and privacy controls to protect healthcare organizations using policies and procedures established by the cybersecurity experts at (ISC)2. TechNows HCISPP Certification Boot Camp is a comprehensive review of Healthcare cybersecurity with privacy best practices & industry best practices.
Attendees to TN-8155: HCISPP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction..
Date/Locations:
Course Duration: 5 days
Course Objectives:
- Strategically focus your preparation for HCISPP Certification
- Cover a broad spectrum of topics in the 7 domains of the HCISPP Common Body of Knowledge (CBK)
- Gain knowledge on the Healthcare industry including third party relationships and health data management concepts
- Identify applicable regulations, compliance frameworks, privacy principles and policies to protect information security
- Develop risk management methodology and identify control assessment procedures
Audience:
- The HCISPP certification is ideal for security professionals responsible for safeguarding protected health information (PHI). Take this HCISPP training course to prepare to manage and implement security controls for healthcare information. HCISPPs are instrumental to a variety of job functions: Compliance Officer, Information Security Manager, Privacy Officer, Compliance Auditor, Risk Analyst, Medical Records Supervisor, IT Manager, Privacy & Security Consultants, and Health Information Manager.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The RHCSA Rapid Track Course is designed for experienced Linux® system administrators who want to expand their technical skill sets and become accredited with the Red Hat® Certified System Administration (RHCSA) certification. To successfully navigate this course, students should have experience with the Linux command line—including the necessary skills to execute common commands, such as cp, grep, sort, mkdir, tar, mkfs, ssh, and dnf—and be familiar with accessing man pages for help. At the completion of the course, students will be adequately prepared to take the RHCSA exam (EX200) .
Date/Locations:
Duration: 5 days
Course Objectives:
- Introduce Linux and the Red Hat Enterprise Linux ecosystem.
- Run commands and view shell environments.
- Manage, organize, and secure files.
- Manage users, groups and user security policies.
- Control and monitor systemd services.
- Configure remote access using the web console and SSH.
- Configure network interfaces and settings.
- Manage software using DNF
- Access security files, file systems, and networks
- Execute shell scripting and automation techniques
- Manage storage devices, logical volumes, and file systems
- Manage security and system access
- Control the boot process and system services
- Running containers
Prerequisites:
Experience in the field system administration.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.
Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Data Protection Laws
- Module 2: Personal Data
- Module 3: Controllers and Processors
- Module 4: Processing Personal Data
- Module 5: Information Provision
- Module 6: Data Subjects’ Rights
- Module 7: Security of Processing
- Module 8: Accountability
- Module 9: International Data Transfers
- Module 10: Supervisions and Enforcement
- Module 11: Compliance.
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
An in-depth course on how to use and configure Cisco Firepower Threat Defense technology, from device setup and configuration and including routing, high availability, Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). Students implement advanced Next Generation Firewall (NGFW) and Next Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network based malware detection, and deep packet inspection.
Students will also learn how to configure site to site VPN, remote access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting. This course combines lecture materials and hands on labs throughout to make sure that students are able to successfully deploy and manage the Cisco Firepower system.
It is a five-day instructor-led course that is aimed at providing network security engineers with the knowledge and skills that are needed to implement and maintain perimeter solutions that are based on Cisco Firepower security appliances. At the end of the course, students will be able to reduce risk to their IT infrastructure and applications using Cisco Firepower security appliance features, and provide detailed operations support for the Firepower appliance.
Attendees to N-485: In-Depth Securing Networks with Cisco Firepower Threat Defense NGFW will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- Understand Sourcefire, Firepower 6.2, FireAMP, and Firepower Threat Defense (FTD)
- Configure the Firepower Management Center (FMC)
- Raise you confidence managing the Firepower Manager and Firepower tThreat Defense (FTD)
- Describe the Cisco Firepower Systems infrastructure
- Navigate the user interface and administrative features of the Cisco Firepower 6.2 system, including advanced analysis and reporting functionality to properly assess threats
- Describe the System Configuration and Health policies and implement them
- Describe the role Network Discovery (Firepower) technology plays in the Cisco devices
- Describe, create, and implement objects for use in Access Control policies
- Create DNS and URL policies and configure Sinkholes
- Configure FTD policies such as Platform, Routing, Interface, Zones, PreFilter, QoS, NAT and Flex Config!
- Describe advanced policy configuration and Firepower system configuration options
- Configure Malware Policies to find and stop Malware
- Understand Security Intelligence, and how to configure SI to stop attacks NOW!
- Configure policies to find and stop Ransomware
- Understand how to fine tune IPS policies
- Understand how to find tun Snort Preprocessor policies (NAP)
- Configure Correlation events, white rules, traffic profiles and create respective events and remediate them
- Analyze events
- Create reporting templates and schedule them
- Configure backups, rule updates, Firepower Recommendations, URL updates, and more to run every week automatically
- Set up external authentication for users using LDAP/Realms
- Configuring system integration, realms, and identity sources
- Configure FMC domains and implement them
- Configure FTD HA with two FTD devices
- SSL Policy – decrypt your traffic
- AnyConnect and Site-to-Site VPN
- Understand network and host based AMP. Configure and analyze host based AMP
- Understand Cisco Identity Services Engine (ISE)
- Configure ISE and integrate with Cisco FMC identity policy using PxGrid
Prerequisites:
- Cisco Certified Network Associate (CCNA) certification. or equivalent
- Cisco Certified Network Associate Security (CCNA Security) certification. or equivalent
- Working knowledge of the Microsoft Windows operating system.
Comments
Latest comments from students
Liked the class? Then let everyone know!