Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-225: Network+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • CT-245: Linux+
    • 08/25/2025 – 08/29/2025
    • San Antonio
  • AZ-900: Microsoft Azure Fundamentals
    • 09/03/2025 – 09/05/2025
    • San Antonio
  • CT-395: CySA+ Cybersecurity Analyst
    • 09/08/2025 – 09/12/2025
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)
    • 09/08/2025 – 09/11/2025
    • San Antonio
  • in   

    TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:

    in   
     

    Course Overview:

    TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers.  CGRC is crucial to the Management staff.

    This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.

    TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:

    • Security and Privacy Governance, Risk Management, and Compliance Program
    • Scope of the System
    • Selection and Approval of Framework, Security, and Privacy Controls
    • Implementation of Security and Privacy Controls
    • Assessment/ Audit of Security and Privacy Controls
    • System Compliance
    • Compliance Maintenance

    RMF Related Steps

    • Prepare – Process Initiation
    • Categorize Information Systems
    • Establish the Security Control Baseline
    • Apply Security Controls
    • Assess Security Controls
    • Authorize Information System
    • Monitor Security Controls

    TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.

    Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.

    Dates/Locations:

    Date/Time Event
    09/08/2025 - 09/11/2025
    08:00 -16:00
    TN-813: Certified in Governance, Risk and Compliance (CGRC)
    TechNow, Inc, San Antonio TX

    Duration: 3 Days

    Course Objectives:

    • Initiate the Preparation Phase
    • Perform Execution Phase
    • Perform Maintenance Phase
    • Understand the Purpose of Security Authorization

    Prerequisites:

    • IT Security
    • Information Assurance
    • Information Risk Management certification and systems administration
    • 1-2 years of general experience technical experience
    • 2 years of general systems experience
    • 1-2 years of Database/Systems Development/Network Experience
    • Information Security Policy Experience

    Comments

    Latest comments from students




    Liked the class?  Then let everyone know!

    Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun.  When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks.  We then cable the switch to the Palo Alto Networks Firewall.  Each student gets their own Palo Alto Firewall Pod of hardware and software.  What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall.  The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services.  The Trust VLAN has Windows and Linux clients.  The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN.  All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.  

    After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment.  Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed.  Using packet captures, custom APP-ID's  and custom signatures are generated.  Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response.  It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment.  In the end we have a good understanding of the Palo Alto Networks Firewall.