Are you looking for a Cisco Training Course?

Your organization needs qualified professionals who can design, implement, and operate Cisco multiprotocol internet works.  With Cisco training from TechNow, you can gain the knowledge and experience your organization needs to succeed.

TechNow’s Cisco Training and Certification Career Path takes students from the fundamentals of networking through a complete line of Cisco courses designed to give students the knowledge and experience they need to master Cisco networking skills in a fast, thorough, and efficient manner.

Our Cisco training courses will prepare you for your work towards Cisco certification.  With years of experience in the Cisco training environment, TechNow can lead you through a dynamic experience to prepare you for Cisco certification.

A list of our Cisco Courses.

in   

Welcome to TechNow! The Leader in Information Security Training & Computer Training.

The world of information security and computer training is ever changing.  The techniques and systems continue to evolve and we must stay current and diligent.  To do this, you can count on TechNow®…the leader in cybersecurity training and computer system training.

TechNow® has been training the leaders in the computer community for many years.  We provide training for students in a number of areas.  Our cybersecurity trainings include popular courses like D0D 8140, Security , CISM, CISSP, CEH,CCNA, and more.  With over 34 years of experience, we’re able to provide you with unmatched training and certification programs.

TechNow also provides a variety of other popular trainings for the computer professional including Cisco, EC-Council, CompTIA, Unix/Linux and more.

.

Upcoming Events

  • CT-245: Linux+
    • 05/11/2026 – 05/15/2026
    • San Antonio
  • CT-210: Project+
    • 05/18/2026 – 05/21/2026
    • San Antonio
  • N-305: CCNA Bootcamp
    • 05/18/2026 – 05/22/2026
    • San Antonio
  • PM-224: PMI Agile Certified Practitioner (PMI-ACP)® Prep Course
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • TN-813: Certified in Governance, Risk and Compliance (CGRC)</a>
    • 05/26/2026 – 05/29/2026
    • San Antonio
  • in   

    Course Overview:

    Red Hat System Administration: Linux Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration.  TechNow’s  Ansible course facilitates the dynamic IT infrastructure through automation.

    This course also supports DevOps practices through Ansible playbooks automating workflows.  TechNow has operated Automated Unix and Linux environment for over 35 years and brings this field experience to the classroom utilizing ansible and discussing its impact on: Infrastructure (Linux, Windows, network devices), Cloud automation (AWS and Azure), Application deployment, Security & compliance, and CI/CD pipelines.

    This course also ties in nicely with the TechNow course CL-355: Containers, Kubernetes, and Red Hat OpenShift Administration which provides an overview of the DoD Enterprise DevSecOps Platform (DSOP) Reference Design, its current state, and ties to DoD Cloud Platform One (P1).

    Dates/Locations:

    No Events

    Duration: 5 days

    Course Objectives:

    • An introduction to Ansible
    • Install and configure Ansible development tools in VS Code and configure Ansible setting
    • Create and update inventories of managed hosts and manage connections to them
    • Automate administration tasks with Ansible Playbooks
    • Write effective playbooks at scale
    • Protect sensitive data used by Ansible Automation Platform with Ansible Vault
    • Reuse code and simplify playbook development with Ansible Roles and Ansible Content Collections
    • Developing Automation Content: Variables, Task Control, Deploying Files
    • Developing Automation Content at Scale
    • Reusing Code with Ansible Roles and Content Collections
    • Automate Linux Administration Tasks

    Prerequisites:

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    Course Overview:

     Cisco DoD Comply-to-Connect (C2C) course teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.

    This training also earns you 32 Continuing Education (CE) credits toward recertification.

    Dates/Locations:

    No Events

    Duration: 5 days

     

    Course Outline: 

    Section 1: C2C Fundamentals

    • Comply to Connect Overview
    • From C2C to ZTA
    • Steps to Implement C2C

    Section 2: Cisco Identity-Based Networking Services

    • Cisco IBNS Overview
    • AAA Role in Cisco IBNS
    • Compare Cisco IBNS and Cisco ISE Solutions
    • Explore Cisco IBNS Architecture Components

    Section 3: Introducing Cisco ISE Architecture

    • Cisco ISE as a Network Access Policy Engine
    • Cisco ISE Use Cases
    • Cisco ISE Functions

    Section 4: Introducing Cisco ISE Deployment

    • Cisco ISE Deployment Models
    • Cisco ISE Licensing and Network Requirements
    • Cisco ISE Context Visibility Features
    • New Features in Cisco ISE 3.X

    Section 5: Introducing Cisco ISE Policy Enforcement Components

    • 802.1X for Wired and Wireless Access
    • MAC Authentication Bypass for Wired and Wireless Access
    • Identity Management
    • Active Directory Identity Source
    • Additional Identity Sources
    • Certificate Services

    Section 6: Introducing Cisco ISE Policy Configuration

    • Cisco ISE Policy
    • Cisco ISE Authentication Rules
    • Cisco ISE Authorization Rules

    Section 7: PKI and Advanced Supplicants

    • Public Key Infrastructure (PKI)
    • TEAP in Comply to Connect (C2C)
    • Secure Client ISE features and Configuration for C2C

    Section 8: Introducing the Cisco ISE Profiler

    • Web Access with Cisco ISE
    • ISE Profiler
    • Cisco ISE Probes
    • Profiling Policy
    • Custom Attributes in Profile

    Section 9: Introducing Cisco ISE Endpoint Compliance Services

    • Endpoint Compliance Services Overview

    Section 10: Configuring Client Posture Services and Compliance

    • Client Posture Services and Provisioning Configuration

    Section 11: Introducing Profiling Best Practices and Reporting

    • Profiling Best Practices

    Section 12: C2C Use Cases

    • Cisco CX ISE Reporting Tool
    • ISE Reporting
    • ISE Hardening
    • Profiling Best Practices for C2C

    Section 13: C2C Third-Party Integrations-Tenable

    • Tenable Use Case
    • Tenable Overview and Capabilities
    • Tenable Integration Prerequisites
    • Tenable Integration Configuration
    • Policy Design
    • Policy Enforcement
    • Enforcement Verification

    Section 14: C2C Third-Party Integrations-MECM

    • MECM Use Case
    • MECM Overview and Capabilities
    • MECM Integration Prerequisites
    • MECM Integration Configuration
    • Policy Design
    • Policy Enforcement
    • Enforcement Verification

    Section 15: C2C Third-Party Integrations-Trellix

    • Trellix Use Case
    • Trellix Overview and Capabilities
    • Trellix Integration Prerequisites
    • Trellix Integration Configuration
    • Policy Enforcement
    • Enforcement Verification

    Section 16: Troubleshooting Cisco ISE Policy and Third-Party NAD

    • Cisco ISE Third-Party Network Access Device Support
    • Troubleshooting Cisco ISE Policy Configuration

    Section 17: Exploring Cisco TrustSec

    • Cisco TrustSec Overview
    • Cisco TrustSec Enhancements
    • Cisco TrustSec Configuration

    Section 18: Working with Network Access Devices

    • Reviewing AAA
    • Cisco ISE TACACS+ Device Administration
    • Configuring TACACS+ Device Administration
    • TACACS+ Device Administration Guidelines and Best Practices

     

    Course Prerequisites: 

    There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

    • Familiarity with 802.1X
    • Familiarity with Microsoft Windows Operating Systems
    • Familiarity with Cisco IOS CLI for wired and wireless network devices
    • Familiarity with Cisco Identity Service Engine

    PP-244: CIPM + CIPP/E 4 Day GDPR Ready

     

    Course Overview:

    A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.

    With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.

    The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education. 

    What’s Included:

    • Authorized courseware
    • 2 Exam vouchers
    • IAPP membership

    **GDPR Regulation Mandated May 25, 2018**

    Course Objectives:

    See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance

    See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance

    Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.

    TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

    TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 4 Days

    Course Content:

     

    Prerequisites: None

    Target Audience:

    Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!