DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


 

 

For further information or to schedule for classes, call us at 800-324-2294

 

in   

    After you press "Request Registration" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Tech Now is pleased to have the opportunity to provide you training for "Windows Security Automation and Threat Hunting with PowerShell” at CheddarCon 2018!

    Scroll down to see the course description.

    First Name*

    Last Name*

    Your Email*

    Your Organization*

    Phone*

    Questions:

    After you press "Request Registration" on this form, within 30 seconds, status will be provided at the bottom of the form, you will also be contacted by phone for credit card information.

    Windows Security Automation and Threat Hunting with PowerShell Seminar

    Location: 400 W Wisconsin Ave, Milwaukee, WI 53203, USA

    Date: October 10, 2018 8:00am – 4:00pm

    Duration: 8 hours

    Audience: Cyber Security professionals and Windows administrators

    Attendees Environment: Laptops not required, but suggested to have better hands-on absorption of subject matter.

    Description:
    PowerShell is both a command-line shell and scripting language. Fight fires quickly using existing or custom PowerShell commands or scripts at the shell. PowerShell is made for Security Operations (SecOps) automation on Windows. This seminar does not require prior programming skills. The seminar focuses on PowerShell programming, giving a beginner skills to be productive in windows scripting to automate tasks and also remediate problems.

    Cyber Security is the objective of this seminar, and the PowerShell examples will demonstrate PowerShell capabilities that help lock down a Windows system and also report security status.

    Objectives:

    PowerShell Overview

    • Getting started running commands
    • Security cmdlets
    • Using and updating the built-in help
    • Execution policies
    • Fun tricks with the ISE graphical editor
    • Piping .NET and COM objects, not text
    • Using properties and methods of objects
    • Helping Linux admins feel more at home
    • Aliases, cmdlets, functions, modules, etc.

    PowerShell Utilities and Tips

    • Customizing your profile script
    • PowerShell remote command execution
    • Security setting across the network
    • File copy via PowerShell remoting
    • Capturing the output of commands
    • Parsing text files and logs with regex patterns
    • Parsing Security Logs
    • Searching remote event logs
    • Mounting the registry as a drive
    • Security settings in the Registry
    • Exporting data to CSV, HTML and JSON files
    • Running scripts as scheduled jobs
    • Continued Security Compliance
    • Pushing out scripts through Group Policy
    • Importing modules and dot-sourcing functions
    • http://www.PowerShellGallery.com

    PowerShell Scripting

    • PowerShell Scripting to implement Security Practices
    • Writing your own functions to automate security status and settings
    • Passing arguments into your scripts
    • Function parameters and returning output
    • Flow control: if-then, foreach, that make security decisions
    • How to pipe data in/out of your scripts for security compliance and reporting

    Attendees to this seminar, Windows Security Automation and Threat Hunting with PowerShell, will receive TechNow approved course materials and expert instruction.[/wr_text][/wr_column][/wr_row]

    Course Overview:

    This course will provide students with proficiency in the everyday management of Linux based clients and basic management of server system. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux based clients, server systems and security.  Let us help you prepare for the CompTIA Linux+ exam (XK0-005).

    TechNow is a CompTIA partner and uses official CompTIA Linux+ curriculum.

    Attendees to CT-245: Linux+ will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    Date/Time Event
    08/25/2025 - 08/29/2025
    08:00 -16:00
    CT-245: Linux+
    TechNow, Inc, San Antonio TX
    12/01/2025 - 12/05/2025
    08:00 -16:00
    CT-245: Linux+
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Perform basic Linux tasks
    • Manage users and groups
    • Manage permissions and ownership
    • Manage storage
    • Manage files and directories
    • Manage kernel modules
    • Manage the Linux boot process
    • Manage system components
    • Manage devices
    • Manage networking
    • Manage packages and software
    • Secure Linux systems
    • Write and execute Bash shell scripts
    • Automate tasks
    • Plan and perform a Linux installation

    Prerequisites:

     

    Comments

    Latest comments from students


    User: cwbrind

    Instructor comments: Great experience with Mr. Peterson, would recommend again. Highly knowledgable and approachable for any subject.

    Facilities comments: The Holiday Inn was a nice location for learning despite traffic around the area.



    Liked the class?  Then let everyone know!

    Course Overview:

    The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it.  The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession.  With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.  CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.  This course will help the student prepare to obtain this credential.

    Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    10/06/2025 - 10/10/2025
    08:00 -16:00
    TN-822: Certified Information Systems Auditor (CISA) Seminar
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • The IS Audit Process (10%)
      • Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
    • IT Governance (15%)
      • Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
    • System and Infrastructure Life Cycle Management (16%)
      • Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
    • IT Service Delivery and Support (14%)
      • Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
    • Protection of Information Assets (31%)
      • Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
    • Business Continuity and Disaster Recovery (14%)
      • Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

    Prerequisites:

    A minimum of five years of professional information systems auditing, control & security work experienced is required.  Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.

    Comments

    Latest comments from students


    User: fsarisen

    Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.


    User: storoy30

    Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.


    Liked the class?  Then let everyone Know!

     

    Course Overview:

    Gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

    After completing this course, students will be able to describe specialized data classifications on Azure, Identify Azure data protection mechanisms, Implement Azure data encryption methods, Secure internet protocols and how to implement them on Azure, Describe Azure security services and features.

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.

    Attendees to AZ-500: Microsoft Azure Security Technologies will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Outline:

    • Identity and access
      • Configure Azure Active Directory for Azure workloads and subscriptions
      • Configure Azure AD Privileged Identity Management
      • Configure security for an Azure subscription
    • Platform Protection
      • Understand cloud security
      • Build a network
      • Secure network
      • Implement host security
      • Implement platform security
      • Implement subscription security
    • Security Operations
      • Configure security services
      • Configure security policies by using Azure Security Center
      • Manage security alerts
      • Respond to and remediate security issues
      • Create security baselines
    • Data and Applications
      • Configure security policies to manage data
      • Configure security for data infrastructure
      • Configure encryption for data at rest
      • Understand application security
      • Implement security for application lifecycle
      • Secure applications
      • Configure and manage Azure Key Vault

    Prerequisites :

        • AZ-900: Microsoft Azure Fundamentals
        • Students should have 1-2 years professional development experience and experience with Microsoft Azure.
        • Student must be able to program in an Azure Supported Language.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!