Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • CT-245: Linux+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • AZ-900: Microsoft Azure Fundamentals
    • 09/03/2025 – 09/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 09/08/2025 – 09/12/2025
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 09/08/2025 – 09/11/2025
    • San Antonio
  • in   
     

    Course Overview:

    TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies is the big picture overview of a SOC, other courses provide a deep dive into the technologies that a SOC may utilize. This course addresses the internal workings of staff, skills required, required authorizations, internal agreements, and setting appropriate expectation levels of a SOC within budget constraints. A SOC is not a one size fits all, the instructor has decades of security experience and brings to the table opportunities to discuss what can work within constraints. Many organizations are coming to the realization that some level of a SOC is now required and to learn just what decisions need to be made: Out-sourced, In-sourced, budgets, capabilities and many more. Students leave with a worksheet of how to progress when they get back to their organization.

    TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies – Is a course that incorporates lecture, demos, and group exercises for standing up a Security Operations Center (SOC). Students learn strategies and resources required to deploy, build, and run Network Security Monitoring (NSM) and work roles and flows for a SOC. No network is bullet proof and when attackers access your network, this course will show you options and resources to build a security net to detect, contain, and control the attacker. Examples on what it takes to architect an NSM solution to identify sophisticated attackers and a response strategy. Properly implemented detection and response technologies is integral to incident response and provides the responders timely information and tools to react to the incident. Effective demonstrations are given of Open Source technologies that build up a SOC, but any software can be used and demonstrations are provided to demonstrate technology families not push a specific solution.

    TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies demonstrations utilize a cyber range that gives each student in-depth knowledge of monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls; and software and services to provide orchestrate Incident Response, Intelligence Analysis, and Hunt Operations.

    Attendees to TN-542: Establishing a Security Operations Center (SOC) People, Processes, and Technologies class will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 2 Days

    Course Objective:

      • To provide management an overview of what it takes to stand up a SOC.

    Prerequisites:

    • Students should have an understanding of the security field.

    Course Outline:

    • What threats does my organization care about?
    • What does a threat look like?
    • What does a threat look like?
    • How to present the SOC internally.
    • Communication with Stakeholders and Executives
    • Leveraging and integrating existing security measures
    • People
      • Establishing a skill matrix and work roles for SOC members
      • Establishing a training path
      • Personnel background requirementsProcesses
    • Processes
      • Alignment to standards: NIST, PCI, HIPAA, etc.
      • Risk related decision trees
      • Playbooks
      • Threat Intelligence Integration
    • Technology – Tool Suites to Support:
      • Ethical Hacking
      • Network Security Monitoring and SIEM
      • Forensics
      • Dashboards
      • Analysis and Hunting
      • Incident Management and Ticketing

     

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

    Course Overview:

    The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

    This course is designed to assist in your exam preparation for the CISM exam.

    Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

    Document Flow Chart iconsm

    Dates/Locations:

    Date/Time Event
    11/17/2025 - 11/21/2025
    08:00 -16:00
    TN-825: Certified Information Security Manager (CISM) Seminar
    TechNow, Inc, San Antonio TX

    Duration: 5 Days

    Course Objectives:

    • Information Security Governance (24%)
    • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
    • Information Risk Management (30%)
    • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
    • Information Security Program Development and Management (27%)
    • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
    • Information Security Incident Management (19%)
    • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

    Prerequisites:

    A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

    Comments

    Latest comments from students


    User: tracycampbell

    Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

    Facilities comments: The Home2Suites by Hilton was FANTASTIC!



    Liked the class?  Then let everyone know!

     

    Course Overview:

    This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.

    NOTE: This course provides an Azure pass and time for you to participate in hands-on labs. The content for this course aligns to AZ-900 exam objective domain

    TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment

    Attendees to AZ-900: Microsoft Azure Fundamentals will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    09/03/2025 - 09/05/2025
    08:00 -16:00
    AZ-900: Microsoft Azure Fundamentals
    TechNow, Inc, San Antonio TX

    Course Duration: 3 days

    Course Outline:

    • Cloud Concepts
    • Core Azure Services
    • Security, Privacy, Compliance, And Trust
    • Azure Pricing and Support

    Lab Objectives:

      • Create a virtual machine
      • Deploy Azure container instances
      • Create a virtual network
      • Create blob storage
      • Create a SQL database
      • Implement an Azure IoT Hub
      • Implement Azure Functions
      • Create a web app
      • Create a VM with a Template
      • Create a VM with PowerShell
      • Create a VM with CLI
      • Secure network traffic
      • Implement Azure key vault
      • Create an Azure Policy
      • Manage access with RBAC
      • Manage resource locks
      • Implement resource tagging
      • Exploring the Trust Center
      • Use the Azure Pricing Calculator
      • Use the Azure TCO Calculator
      • Open a Support request
      • Calculate composite SLAs
      • Access Azure Preview features

    Prerequisites :

        • There are no prerequisites for taking this course. Technical IT experience is not required however some general IT knowledge or experience would be beneficial.
        • This course is suitable for IT personnel who are just beginning to work with Azure.
        • This course primarily uses the Azure portal to create services and does not require scripting skills.
        • Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator.
        • This course provides an Azure pass and optional lab environment.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers.  CGRC is crucial to the Management staff.

    This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.

    TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:

    • Security and Privacy Governance, Risk Management, and Compliance Program
    • Scope of the System
    • Selection and Approval of Framework, Security, and Privacy Controls
    • Implementation of Security and Privacy Controls
    • Assessment/ Audit of Security and Privacy Controls
    • System Compliance
    • Compliance Maintenance

    RMF Related Steps

    • Prepare – Process Initiation
    • Categorize Information Systems
    • Establish the Security Control Baseline
    • Apply Security Controls
    • Assess Security Controls
    • Authorize Information System
    • Monitor Security Controls

    TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.

    Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.

    Dates/Locations:

    Date/Time Event
    09/08/2025 - 09/11/2025
    08:00 -16:00
    TN-813: Certified in Governance, Risk and Compliance (CGRC)
    TechNow, Inc, San Antonio TX

    Duration: 3 Days

    Course Objectives:

    • Initiate the Preparation Phase
    • Perform Execution Phase
    • Perform Maintenance Phase
    • Understand the Purpose of Security Authorization

    Prerequisites:

    • IT Security
    • Information Assurance
    • Information Risk Management certification and systems administration
    • 1-2 years of general experience technical experience
    • 2 years of general systems experience
    • 1-2 years of Database/Systems Development/Network Experience
    • Information Security Policy Experience

    Comments

    Latest comments from students




    Liked the class?  Then let everyone know!