Course Overview:

The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

This course is designed to assist in your exam preparation for the CISM exam.

Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
04/27/2026 - 05/01/2026
08:00 -16:00
TN-825: Certified Information Security Manager (CISM) Seminar
TechNow, Inc, San Antonio TX
08/17/2026 - 08/21/2026
08:00 -16:00
TN-825: Certified Information Security Manager (CISM) Seminar
TechNow, Inc, San Antonio TX
11/16/2026 - 11/20/2026
08:00 -16:00
TN-825: Certified Information Security Manager (CISM) Seminar
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Information Security Governance (24%)
  • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
  • Information Risk Management (30%)
  • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
  • Information Security Program Development and Management (27%)
  • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
  • Information Security Incident Management (19%)
  • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

Prerequisites:

A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Comments

Latest comments from students


User: tracycampbell

Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

Facilities comments: The Home2Suites by Hilton was FANTASTIC!



Liked the class?  Then let everyone know!

Course Overview:

 Cisco DoD Comply-to-Connect (C2C) course teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.

This training also earns you 32 Continuing Education (CE) credits toward recertification.

Dates/Locations:

No Events

Duration: 5 days

 

Course Outline: 

Section 1: C2C Fundamentals

  • Comply to Connect Overview
  • From C2C to ZTA
  • Steps to Implement C2C

Section 2: Cisco Identity-Based Networking Services

  • Cisco IBNS Overview
  • AAA Role in Cisco IBNS
  • Compare Cisco IBNS and Cisco ISE Solutions
  • Explore Cisco IBNS Architecture Components

Section 3: Introducing Cisco ISE Architecture

  • Cisco ISE as a Network Access Policy Engine
  • Cisco ISE Use Cases
  • Cisco ISE Functions

Section 4: Introducing Cisco ISE Deployment

  • Cisco ISE Deployment Models
  • Cisco ISE Licensing and Network Requirements
  • Cisco ISE Context Visibility Features
  • New Features in Cisco ISE 3.X

Section 5: Introducing Cisco ISE Policy Enforcement Components

  • 802.1X for Wired and Wireless Access
  • MAC Authentication Bypass for Wired and Wireless Access
  • Identity Management
  • Active Directory Identity Source
  • Additional Identity Sources
  • Certificate Services

Section 6: Introducing Cisco ISE Policy Configuration

  • Cisco ISE Policy
  • Cisco ISE Authentication Rules
  • Cisco ISE Authorization Rules

Section 7: PKI and Advanced Supplicants

  • Public Key Infrastructure (PKI)
  • TEAP in Comply to Connect (C2C)
  • Secure Client ISE features and Configuration for C2C

Section 8: Introducing the Cisco ISE Profiler

  • Web Access with Cisco ISE
  • ISE Profiler
  • Cisco ISE Probes
  • Profiling Policy
  • Custom Attributes in Profile

Section 9: Introducing Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance Services Overview

Section 10: Configuring Client Posture Services and Compliance

  • Client Posture Services and Provisioning Configuration

Section 11: Introducing Profiling Best Practices and Reporting

  • Profiling Best Practices

Section 12: C2C Use Cases

  • Cisco CX ISE Reporting Tool
  • ISE Reporting
  • ISE Hardening
  • Profiling Best Practices for C2C

Section 13: C2C Third-Party Integrations-Tenable

  • Tenable Use Case
  • Tenable Overview and Capabilities
  • Tenable Integration Prerequisites
  • Tenable Integration Configuration
  • Policy Design
  • Policy Enforcement
  • Enforcement Verification

Section 14: C2C Third-Party Integrations-MECM

  • MECM Use Case
  • MECM Overview and Capabilities
  • MECM Integration Prerequisites
  • MECM Integration Configuration
  • Policy Design
  • Policy Enforcement
  • Enforcement Verification

Section 15: C2C Third-Party Integrations-Trellix

  • Trellix Use Case
  • Trellix Overview and Capabilities
  • Trellix Integration Prerequisites
  • Trellix Integration Configuration
  • Policy Enforcement
  • Enforcement Verification

Section 16: Troubleshooting Cisco ISE Policy and Third-Party NAD

  • Cisco ISE Third-Party Network Access Device Support
  • Troubleshooting Cisco ISE Policy Configuration

Section 17: Exploring Cisco TrustSec

  • Cisco TrustSec Overview
  • Cisco TrustSec Enhancements
  • Cisco TrustSec Configuration

Section 18: Working with Network Access Devices

  • Reviewing AAA
  • Cisco ISE TACACS+ Device Administration
  • Configuring TACACS+ Device Administration
  • TACACS+ Device Administration Guidelines and Best Practices

 

Course Prerequisites: 

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with 802.1X
  • Familiarity with Microsoft Windows Operating Systems
  • Familiarity with Cisco IOS CLI for wired and wireless network devices
  • Familiarity with Cisco Identity Service Engine

DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is available for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce.


 

 

For further information or to schedule for classes, call us at 800-324-2294

 

in   

DoD 8570 Training

The Department of Defense requires that all information assurance personnel must become compliant with IT and security certification standards.

DoD 8570 training, also called Information Assurance training, is available through TechNow to provide you with the certification that is required.  Your DoD 8570 training  ( information assurance training ) at TechNow will provide you with all of the courses necessary to receive your DoD 8570.01-M certification.

Ongoing open enrollment through TechNow is availble for our DoD 8570.01-M courses.

Please review the full & updated DoD approved IA baseline certifications aligned to each category & level of the IA workforce:

Note: The Certifications in red are recently added to approved list as of 2/4/19

For further information or to schedule for classes, call us at 800-324-2294

in   

Course Overview:

SecurityX®  (formerly known as CASP+)  course prepares you for the CompTIA SecurityX® certification exam (CVO-005) and demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines. This course will prepare students for the objectives covered in the CompTIA SecurityX certification exam (CVO-005).

Attendees to CT-425: CompTIA SecurityX will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
06/08/2026 - 06/12/2026
08:00 -16:00
CT-425: CompTIA SecurityX
TechNow, Inc, San Antonio TX
08/31/2026 - 09/04/2026
08:00 -16:00
CT-425: CompTIA SecurityX
TechNow, Inc, San Antonio TX
11/30/2026 - 12/04/2026
08:00 -16:00
CT-425: CompTIA SecurityX
TechNow, Inc, San Antonio TX

Duration: 5 days

Course Objectives:

  • Support IT governance in the enterprise with an emphasis on managing risk
  • Leverage collaboration tools and technology to support enterprise security
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
  • Implement cryptographic techniques
  • Implement security controls for hosts
  • Implement security controls for mobile devices
  • Implement network security
  • Implement security in the systems and software development lifecycle
  • Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
  • Conduct security assessments
  • Respond to and recover from security incidents

Prerequisites:

Completion of the following or equivalent knowledge:

Minimum of 10 years general hands on IT experience

5 years being hands-on security

CompTIA Certification: Network+

CompTIA Certification: Security+

CompTIA Certification: CySA+

OR equivalent knowledge

Comments

Latest comments from students


User: clbrack

Instructor comments: I expect to pass, another great class from technow!


User: christopher0470

Instructor comments: Alan takes the time to cover the material so that you understand the concepts and applications of the information presented.

Facilities comments: I like the location. It was quiet and very conducive to learning.


Liked the class?  Then let everyone know!