1. SCOPE

a. The Contractor shall provide training courses normally available to commercial customers, which will permit Government users to make full, efficient use of general purpose commercial IT products. Training is restricted to training courses for those products within the scope of this solicitation.
b. The Contractor shall provide training at the Contractor’s facility and/or at the Government’s location, as agreed to by the Contractor and the Government.

2. ORDER

Written orders, EDI orders (GSA Advantage! and FACNET), credit card orders, and orders placed under blanket purchase agreements (BPAs) shall be the basis for the purchase of training courses in accordance with the terms of this contract. Orders shall include the student’s name, course title, course date and time, and contracted dollar amount of the course.

3. TIME OF DELIVERY
The Contractor shall conduct training on the date (time, day, month, and year) agreed to by the Contractor and the Government.

4. CANCELLATION AND RESCHEDULING

a. The Government will notify the Contractor at least seventy-two (72) hours before the scheduled training date, if a student will be unable to attend. The Contractor will then permit the Government to either cancel the order or reschedule the training at no additional charge. In the event the training class is rescheduled, the Government will modify its original training order to specify the time and date of the rescheduled training class.
b. In the event the Government fails to cancel or reschedule a training course within the time frame specified in paragraph a, above, the Government will be liable for the contracted dollar amount of the training course. The Contractor agrees to permit the Government to reschedule a student who fails to attend a training class within ninety (90) days from the original course date, at no additional charge.
c. The Government reserves the right to substitute one student for another up to the first day of class.
d. In the event the Contractor is unable to conduct training on the date agreed to by the Contractor and the Government, the Contractor must notify the Government at least seventy-two (72) hours before the scheduled training date.

5. FOLLOW-UP SUPPORT

The Contractor agrees to provide each student with unlimited telephone support for a period of one (1) year from the completion of the training course. During this period, the student may contact the Contractor’s instructors for refresher assistance and answers to related course curriculum questions.

6. PRICE FOR TRAINING

The price that the Government will be charged will be the Government training price in effect at the time of order placement, or the Government price in effect at the time the training course is conducted, whichever is less.

7. INVOICES AND PAYMENT

Invoices for training shall be submitted by the Contractor after Government completion of the training course. Charges for training must be paid in arrears (31 U.S.C. 3324). PROMPT PAYMENT DISCOUNT, IF APPLICABLE, SHALL BE SHOWN ON THE INVOICE.

8. FORMAT AND CONTENT OF TRAINING

a. The Contractor shall provide written materials (i.e., manuals, handbooks, texts, etc.) normally provided with course offerings. Such documentation will become the property of the student upon completion of the training class.
b. For hands-on training courses, there must be a one-to-one assignment of IT equipment to students.
c. The Contractor shall provide each student with a Certificate of Training at the completion of each training course.
d. The Contractor shall provide the following information for each training course offered:
(1) The course title and a brief description of the course content, to include the course format (e.g., lecture, discussion, hands-on training);
(2) The length of the course;
(3) Mandatory and desirable prerequisites for student enrollment;
(4) The minimum and maximum number of students per class;
(5) The locations where the course is offered;
(6) Class schedules; and
(7) Price (per student, per class (if applicable).

INFORMATION APPLICABLE TO ALL COURSES:

The format of all courses will include lecture, discussion and hands-on training.(4) Minimum Number of Students: one for courses at TechNow Training Facilities, ten for courses at the client’s facility; Maximum Number of Students: twelve, for courses at TechNow and client facilities.

(5) LOCATIONS:

San Antonio Office
14117 Jones Maltsberger Rd.
San Antonio, TX 78247
Toll Free: 800-324-2294
Telephone: 210-733-1093
Fax: 210-733-6032

 

in   

Course Overview:

The System Administration I for Red Hat course is designed for IT professionals working to become full-time enterprise Linux system administrators. This course gives the student direct experience with the most essential system administration tasks in the Red Hat. You will be instructed in crucial system management skills including: configuring network interfaces, client set up of network protocols, managing local disk devices, installation, package management, performing system boot procedures, grub and controlling system processes.

Attendees to RH-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.

Dates/Locations:

Date/Time Event
03/02/2026 - 03/06/2026
08:00 -16:00
RH-245: Linux System Administration I
TechNow, Inc, San Antonio TX
06/01/2026 - 06/05/2026
08:00 -16:00
RH-245: Linux System Administration I
TechNow, Inc, San Antonio TX
09/14/2026 - 09/18/2026
08:00 -16:00
RH-245: Linux System Administration I
TechNow, Inc, San Antonio TX

Duration: 5 days

Course Objectives:

  • Installation
  • Manage File Systems and Local Disk Drives
  • Perform Mounts and Unmounts
  • Perform System Boot Procedures
  • Tuning and Maintaining the Kernel
  • Control System Processes
  • Perform User Administration
  • Installing and Managing Services
  • Perform Package Administration
  • Client Setup of SSH and Printing

Prerequisites:

Comments

Latest comments from students


User: mlspence

Instructor comments: Bill was awesome! He did a fantastic job teaching the course mater to everyone in the class. He made sure everyone was able to keep up and that they understood the material before moving on. Thanks!

Facilities comments: They were great as well



Liked the class?  Then let everyone know!

 

Course Overview:

TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers.  CGRC is crucial to the Management staff.

This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.

TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:

  • Security and Privacy Governance, Risk Management, and Compliance Program
  • Scope of the System
  • Selection and Approval of Framework, Security, and Privacy Controls
  • Implementation of Security and Privacy Controls
  • Assessment/ Audit of Security and Privacy Controls
  • System Compliance
  • Compliance Maintenance

RMF Related Steps

  • Prepare – Process Initiation
  • Categorize Information Systems
  • Establish the Security Control Baseline
  • Apply Security Controls
  • Assess Security Controls
  • Authorize Information System
  • Monitor Security Controls

TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.

Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.

Dates/Locations:

Date/Time Event
02/17/2026 - 02/20/2026
08:00 -16:00
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX
05/26/2026 - 05/29/2026
08:00 -16:00
TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
TechNow, Inc, San Antonio TX
09/08/2026 - 09/11/2026
08:00 -16:00
TN-813: Certified in Governance, Risk and Compliance (CGRC)
TechNow, Inc, San Antonio TX

Duration: 3 Days

Course Objectives:

  • Initiate the Preparation Phase
  • Perform Execution Phase
  • Perform Maintenance Phase
  • Understand the Purpose of Security Authorization

Prerequisites:

  • IT Security
  • Information Assurance
  • Information Risk Management certification and systems administration
  • 1-2 years of general experience technical experience
  • 2 years of general systems experience
  • 1-2 years of Database/Systems Development/Network Experience
  • Information Security Policy Experience

Comments

Latest comments from students




Liked the class?  Then let everyone know!

  

Course Overview:

TechNow’s CCSP Certification Preparation Seminar is an accelerated course designed to meet the high demands of the information security industry by preparing students for the industry standard Certified Cloud Security Professional exam.  The exam covers (ISC)²’s 6 Domains from the Common Body of Knowledge, which encompass the whole of cloud security.

This course is an intense 5 day program.  TechNow has a proven training and certification track record that you can depend on.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.   The instructor takes time to walk through scenarios that assume comprehensive knowledge of enterprise infrastructures.

Attendees to CL-315: CCSP Certification Preparation Seminar will receive TechNow approved course materials and expert instruction.

The 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance

Duration: 5 days

Audience:  Mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.   CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.

DoD 8140:  Not Mandated

Course Prerequisites:  IT professional with 5 years of experience, 3 years of security experience, and at least 1 year of cloud security experience.  GSEC, CISSP, CASP or equivalent experience in managing enterprise infrastructures.  CCSP test is 125 questions that typically require more comprehension than CISSP questions.  This course is for those who are already qualified at the enterprise level for IT infrastructures, have Cloud experience, and are looking for a Cloud Security certification.

Course Objectives:

Domain 1: Architectural Concepts and Design Requirements

  • Module 1: Understand cloud computing concepts
  • Module 2: Describe cloud reference architecture
  • Module 3: Understand security concepts relevant to cloud computing
  • Module 4: Understand design principles of secure cloud computing
  • Module 5: Identify trusted cloud services

Domain 2: Cloud Data Security

  • Module 1: Understand Cloud Data Life Cycle
  • Module 2: Design and Implement Cloud Data Storage Architectures
  • Module 3: Understand and implement Data Discovery and Classification Technologies
  • Module 4: Design and Implement Relevant Jurisdictional Data Protection for Personally Identifiable Information (PII)
  • Module 5: Design and implement Data Rights Management
  • Module 6: Plan and Implement Data Retention, Deletion, and Archival policies
  • Module 7: Design and Implement Auditability, Traceability, and Accountability of Data Events

Domain 3: Cloud Platform Infrastructure Security

  • Module 1: Comprehend Cloud Infrastructure Comp
  • Module 2: Analyze Risks Associated to Cloud Infrastructure
  • Module 3: Design and Plan Security Controls
  • Module 4: Plans Disaster Recovery & Business Continuity Management

Domain 4: Cloud Application Security

  • Module 1: Recognize Need for Training and Awareness in Application Security
  • Module 2: Understand Cloud Software Assurance and Validation
  • Module 3: Use Verified Secure Software
  • Module 4: Comprehend the Software Development Life Cycle (SDLC) Process
  • Module 5: Apply the Secure Software Development Life Cycle
  • Module 6: Comprehend the Specifics of Cloud Application Architecture
  • Module 7: Design Appropriate Identity and Access Management (IAM) Solutions

Domain 5: Operations

  • Module 1: Support the Planning Process for the Data Center Design
  • Module 2: Implement and Build Physical Infrastructure for Cloud Environment
  • Module 3: Run Physical Infrastructure for Cloud Environment
  • Module 4: Manage Physical Infrastructure for Cloud Environment
  • Module 5: Build Logical Infrastructure for Cloud Environment
  • Module 6: Run Logical Infrastructure for Cloud Environment
  • Module 7: Manage Logical Infrastructure for Cloud Environment
  • Module 8: Ensure Compliance with Regulations and Controls
  • Module 9: Conduct Risk Assessment to Logical and Physical Infrastructure
  • Module 10: Understand the Collection and Preservation of Digital Evidence
  • Module 11: Manage Communications with Relevant Parties

Domain 6: Legal and Compliance

  • Module 1: Understand Legal Requirements and Unique Risks Within the Cloud Environment
  • Module 2: Understand Privacy Issues, Including Jurisdictional Variances
  • Module 3: Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • Module 4: Understand Implication of Cloud to Enterprise Risk Management
  • Module 5: Understand Outsourcing and Cloud Contract Design
  • Module 6: Execute Vendor Management

Dates/Locations:

No Events

 

Comments

Latest comments from students


User: mrotek

Instructor comments: Dave is an excellent instructor. Very knowledgeable on many levels of technology.


User: fella

Instructor comments: Very knowledgeable the security arena.

Facilities comments: At our office.



Next/Related Courses:

CISSP Certification Seminar

 

 

Course Overview:

In this course students will learn to install the Linux™ operating system, to administer users and software, to use vi, basic Linux security, process control, file system maintenance, backup and recovery, including some basic networking concepts. This course insures that students have the skills to configure all desktop and client side related activity.

Attendees to L-245: Linux System Administration I will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 days

Course Objectives:

  • Linux operating system installation
  • Hardware Issues
  • LILO & GRUB Configuration
  • Managing the Linux file system
  • Boot Process
  • Customization of setup files
  • System Startup
  • Run Levels
  • Network Services
  • User Management
  • Changing Passwords
  • Monitoring, accessing & restricting root system access
  • Administration Tools
  • Disk Management
  • Quotas
  • Process Control
  • Installing & removing software & patches
  • Network Configuration
  • Client side components of NFS, Samba, NTP, NIS
  • Printing
  • Backup and Recovery
  • Using utilities for process control, locating files & automating maintenance tasks

Prerequisites:

  • Students should have an understanding of all basic UNIX commands as well as variable substitution, wild card expansion, command pipes, permissions, the grep  and find commands.
  • These prerequisites can be met through completion of TN-125: Introduction to UNIX & Linux and six month’s experience with Linux.

 

Comments

Latest comments from students


User: flores2015

Instructor comments: Very Good Instructor (Bill Peterson)

Facilities comments: Nice - Can't wait for your new facility.



Liked the class?  Then let everyone know!