Here are our Microsoft Programming courses:
Course Overview:
Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready
What’s Included:
- Authorized courseware
- Exam voucher
- IAPP membership
**GDPR Regulation Mandated May 25, 2018**
Course Objectives:
Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.
Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.
TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).
TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.
Dates/Locations:
Duration: 2 Days
Course Content:
- Module 1: Introduction to Privacy Program Management
- Module 2: Privacy Governance
- Module 3: Applicable Laws and Regulations
- Module 4: Data Assessments
- Module 5: Policies
- Module 6: Data Subjects’ Rights
- Module 7: Training and Awareness
- Module 8: Protecting Personal Information
- Module 9: Data Breach Incident Plans
- Module 10: Measuring, Monitoring and Auditing Program Performance
Prerequisites: None
Target Audience:
Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow provides an array of courses to meet our customer's requirements. Courses that do not fit into our major course categories and custom or specialized courses appear here.
Here are courses about specilaized Software or Hardware:
- CL-218: Introduction to Cloud Infrastructure and Operations Bootcamp
- IT-113: IT Infrastructure Library (ITIL) v4 – Foundations Course
- N-495: Voice-over IP (VoIP) Foundations
- PA-212: Palo Alto Networks Firewall Configure Extended Features (EDU-205)
- PA-213: Palo Alto Networks Firewall Install, Configure, and Manage (EDU-201)
- PA-215: Palo Alto Networks Firewall Essentials FastTrack
- PA-222: Palo Alto Networks Panorama Essentials
- PA-232: Palo Alto Networks Panorama Manage Multiple Firewalls (EDU-221)
- PA-243: Palo Alto Networks Firewall Debug and Troubleshoot (EDU-311)
- RH-345: Red Hat JBoss Application Administration I
- TN-102: Writing Effective Requirements
- TN-205: A+ Skills Class
- TN-225: Network+ Skills Class
- TN-245: Telecommunications Fundamentals
- TN-395: Internet Protocol Version 6 (IPv6)
- TN-430: Elasticsearch Engineer (ELK)
- TN-801: Windows for Security Professionals
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-905: Cyber Threat Intelligence Analysis
- TN-911: Cyber Threat Intelligence (CTI) Analysis and 800-172 Seminar
- TN-963: Windows Security Automation with PowerShell
- VM-315: VMware Infrastructure: Install, Configure, and Manage
- VM-325: VMware View: Install, Configure and Manage
Course Overview:
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
- Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes
- Describe enterprise storage solutions, and select the appropriate solution for a given situation
- Implement and manage Storage Spaces and Data Deduplication
- Install and configure, and manage Windows and Hyper-V containers
- Describe the high availability and disaster recovery technologies in Windows Server 2016
- Plan, create, and manage a failover cluster
- Implement failover clustering for Hyper-V virtual machines
- Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation
- Create and manage deployment images
- Manage, monitor, and maintain virtual machine installations
Prerequisites:
- A basic understanding of networking fundamentals
- An awareness and understanding of security best practices
- An understanding of basic AD DS concepts
- Basic knowledge of server hardware
- Experience supporting and configuring Windows client operating systems such as Windows 10
Liked the class? Then let everyone know!
Course Overview:
PenTest+ is an intermediate-level certification for cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network. PenTest+ is at the same certification level as CT-395: CySA+. Depending on your course of study, PenTest+ and CySA+ can be taken in any order, but typically follow the skills learned in CT-325: Security+. PenTest+ focuses on offense through penetration testing and vulnerability assessment while CySA+ focuses on defense through incident detection and response. The most qualified cybersecurity professionals have both offensive and defensive skills. Attend Tech Now training for hands-on, instructor led course to prepare you for the CompTIA PT0-002 exam. This exam is hands-on, performance-based questions and multiple choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.

What’s Included:
- 5 days of instructor led in classroom training
- Labs
- PenTest+ Courseware
- Exam Voucher
- PenTest+ onsite exam scheduling
Course Objectives:
- Plan and scope penetration tests
- Conduct passive reconnaissance
- Perform non-technical tests to gather information
- Conduct active reconnaissance
- Analyze vulnerabilities
- Penetrate networks
- Exploit host-based vulnerabilities
- Test application
- Complete post-exploit tasks
- Analyze and report pen test results
Dates/Locations:
Duration: 5 Days
Course Content:
-
- Module 01. Planning and Scoping Penetration Tests
- Module 02. Conducting Passive Reconnaissance
- Module 03. Performing Non-Technical Tests
- Module 04. Conducting Active Reconnaissance
- Module 05. Analyzing Vulnerabilities
- Module 06. Penetrating Networks
- Module 07. Exploiting Host-Based Vulnerabilities
- Module 08. Testing Applications
- Module 09. Completing Post-Exploit Tasks
- Module 10. Analyzing and Reporting Pen Test Results
Prerequisites:
-
-
- CT-225: Network+
- CT-325: Security+
- 3-4 years of hands-on information security or related experience
-
Target Audience:
This course is designed for cybersecurity professionals tasked with penetration testing and vulnerability management.
Comments
Latest comments from students