TechNow offers many courses that also have a related certification exam. As an Authorized Peason VUE testing center, we offer exams for many certifications. Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.
Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
In this course, students learn the IPv6 protocols & processes & describe how IPv6 is supported in the latest versions of Microsoft Windows operating system. Students will also learn how to describe transition technologies that allow you to deploy IPv6 in IPv4 intranets & across the IPv4 Internet.
Attendees to TN-395: Internet Protocol Version 6 (IPv6) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Learn how to create IPv6 networks with Cisco Systems products
- Supplement your IPv6 course with a self-study guide based on the course materials
- Understand practical applications of IPv6 through a solutions-oriented writing approach
- Increase comprehension & retention through chapter tools like objectives, summaries, scenarios & review questions
- Features & benefits of IPv6
- IPv6 in the Windows Server2003 Family
- IPv6 addressing & the IPv6 header
- Internet Control Message Protocol for IPv6 (ICMPv6)
- Neighbor & multicast listener discovery
- Address auto configuration
- IPv6 name resolution & routing
- Coexistence & migration
- IPv6 mobility
Prerequisites:
- Students should have a working knowledge of a Windows OR Unix Operating system.
- In addition, the student should also have basic end-user skills in TCP/IP.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers. CGRC is crucial to the Management staff.
This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.
TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:
- Security and Privacy Governance, Risk Management, and Compliance Program
- Scope of the System
- Selection and Approval of Framework, Security, and Privacy Controls
- Implementation of Security and Privacy Controls
- Assessment/ Audit of Security and Privacy Controls
- System Compliance
- Compliance Maintenance
RMF Related Steps
- Prepare – Process Initiation
- Categorize Information Systems
- Establish the Security Control Baseline
- Apply Security Controls
- Assess Security Controls
- Authorize Information System
- Monitor Security Controls
TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.
Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.
Dates/Locations:
Date/Time | Event |
---|---|
03/31/2025 - 04/04/2025 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
05/28/2025 - 05/30/2025 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
09/08/2025 - 09/11/2025 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- Initiate the Preparation Phase
- Perform Execution Phase
- Perform Maintenance Phase
- Understand the Purpose of Security Authorization
Prerequisites:
- IT Security
- Information Assurance
- Information Risk Management certification and systems administration
- 1-2 years of general experience technical experience
- 2 years of general systems experience
- 1-2 years of Database/Systems Development/Network Experience
- Information Security Policy Experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course begins by introducing you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure.
The course continues to teach students how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives and regulatory compliance standards and examines use cases for running regulated workloads on AWS across different verticals, globally. You will also learn how to leverage AWS services and tools for automation and continuous monitoring—taking your security operations to the next level.
Attendees to CL-425: AWS Security Operations and Architecture will receive TechNow approved course materials and expert instruction.
Duration: 5 Days
Audience:
• Security engineers
• Security architects
• Security analysts
• Security auditors
• Individuals who are responsible for governing, auditing, and testing an organization’s IT infrastructure, and ensuring conformity of the infrastructure to security, risk, and compliance guidelines
DoD 8140: Not Mandated
Course Prerequisites:
We recommend that attendees of this course have the following prerequisites:
This course assumes you have the equivalent experience or have taken the AWS operational courses that are in the TechNow AWS track.
• CL-415: AWS Security Operations
The above courses encapsulate prerequisite knowledge:
• Experience with governance, risk, and compliance regulations and control objectives
• Working knowledge of IT security practices
• Working knowledge of IT infrastructure concepts
• Familiarity with cloud computing concepts
Course Objectives:
This course teaches you how to:
• Identify the security and compliance benefits of using the AWS cloud.
• Discuss the AWS Shared Responsibility Model.
• Describe the access control and access management features of AWS.
• Use AWS services for security logging and monitoring.
• Describe data encryption methods to secure sensitive data.
• Describe AWS services used to protect network security.
• Describe the basic steps to ensure strong governance of your AWS resources.
• Identify AWS services used to maintain governance of control environments.
• Use the AWS audit features.
• Explain how to audit an AWS environment.
• Explain the AWS compliance and assurance programs.
• Describe how AWS audits and attestations validate that security controls are implemented and operating effectively.
• Assimilate and leverage the AWS shared security responsibility model.
• Mange user identity and access management in the AWS cloud.
• Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.
• Implement better security controls for your resources in the AWS cloud.
• Manage and audit your AWS resources from a security perspective.
• Monitor and log access and usage of AWS compute, storage, networking, and database services.
• Analyze events by capturing, monitoring, processing, and analyzing logs.
• Identify AWS services and tools to help automate, monitor, and manage security operations on AWS.
• Perform security incident management in the AWS cloud.
• Perform security assessments to ensure that common vulnerabilities are patched and security best practices are applied. The assessment outline deals both with AWS specifics and also lays down the workflow of NIST, FedRAMP, and Cloud Security Alliance STAR compliance for a deployed AWS solution.
Dates/Locations: No Events
Course Outline:
Day 1
• Introduction to Cloud Computing and AWS Security
• Access Control and Management
• AWS Security: Governance, Logging, and Encryption
• Compliance and Risk Management
Day 2
• Introduction to Cloud Security Course Objectives
• Security of the AWS Cloud: Entry Points, Web Application, Communications, and Incident Response.
• Cloud Aware Governance and Compliance and related control frameworks.
• Identity and Access Management
Day 3
• Securing AWS Infrastructure Services
• Securing AWS Container Services
• Securing AWS Abstracted Services
• Using AWS Security Services
Day 4
• Data Protection in the AWS Cloud
• Managing security in a hybrid environment
• Deep dive into AWS monitoring and log analysis
• Protecting against outside threats to AWS VPC
Day 5
• How to carry out a Pentest on an AWS solution
• Security Incident Management and Automating security and incident response
• Threat detection and monitoring sensitive data
• Lets Do it! Building Compliant Workloads on AWS—Case Study