Course Overview:
TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers. CGRC is crucial to the Management staff.
This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.
TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:
- Security and Privacy Governance, Risk Management, and Compliance Program
- Scope of the System
- Selection and Approval of Framework, Security, and Privacy Controls
- Implementation of Security and Privacy Controls
- Assessment/ Audit of Security and Privacy Controls
- System Compliance
- Compliance Maintenance
RMF Related Steps
- Prepare – Process Initiation
- Categorize Information Systems
- Establish the Security Control Baseline
- Apply Security Controls
- Assess Security Controls
- Authorize Information System
- Monitor Security Controls
TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.
Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.
Dates/Locations:
Date/Time | Event |
---|---|
09/08/2025 - 09/11/2025 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- Initiate the Preparation Phase
- Perform Execution Phase
- Perform Maintenance Phase
- Understand the Purpose of Security Authorization
Prerequisites:
- IT Security
- Information Assurance
- Information Risk Management certification and systems administration
- 1-2 years of general experience technical experience
- 2 years of general systems experience
- 1-2 years of Database/Systems Development/Network Experience
- Information Security Policy Experience
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course is very hands-on with respect to SP 800-53 controls as related to ICD-503, leveraging experience with DCD 6/3, and incorporating a broad array of technologies found in the field. Assessors and Auditors have to face many technologies that are not part of the main stream. TechNow has gone to great efforts to build a very broad, comprehensive, and complex lab to simulate many scenarios and architectures. Technologies such as a network appliance that is not a typical infrastructure product, a radio/satellite communications device, or many other technologies that build up a weapon system. Students learn how controls are integrated into many different devices and how they fit in the overall security architecture of monitoring, reporting, and compliance testing.
Directly discussed are overlays for different requirements i.e.: tactical, medical, network type: JWICS, SIPR; IC or AF. TechNow has developed a funnel concept to overlays to exemplify the encapsulation of a control within different requirements. TechNow has over 15 years experience in Trusted Solaris/Trusted Extensions and labeled security. Cross Domain overlays are presented that fits the work flow of an assesor. PII overlays and any overlays that an organization uses and can be made available are also presented.
This course allows the student to leverage years of experience in DoD DCD 6/34 for transition to the Risk Management Framework (RMF) applied to the Intelligence Community as mandated by ICD 503. Utilizing NIST SP 800-37 to establish a baseline of RMF knowledge, the student learns how to integrate the NIST pubs to provide cohesive information assurance architectures and compliance. ICD 503 scorecard evaluations are integral in demonstrating a successful ICD 503 compliance program. TechNow's ICD 503 course provides students with the skill to assess security programs and evaluate ICD 503 compliance to build an improvement and sustainable program for score consistency. TechNow's instructors have unparralleled expertise in federal compliance initiatives, and we bring this expertise instructing students on the complete life cycle of RMF.
More than a simple checklist, we instruct students not only how to validate essential security controls, programs, and metrics, but that they are operating effectively. The student leaves the course knowing how to: identify gaps where controls, programs, or metrics are incomplete, missing or ineffective, and provide actionable findings and recommend remediation strategies. Students learn to internalize NIST pubs to meaningul and effective IA guidelines and work with the Body of Evidence templates which include: Risk Assessment Report (RAR), Systems Security Plan (SSP), Security Assessment Report (SAR), and Plans of Action and Milestone (POAM).
TechNow training materials are aligned with the most recent set of National Institute of Standards and Technology (NIST), Committee on National Security Systems (CNSS), and Office of the Director of National Intelligence (ODNI) policies standards, processes, policies and instructions to be addressed/explained include ICD 503, ICS 503-1, ICS 500-16, ICS 500-18, ICS 500-27, ICD 502, NIST SP 800-37, NIST SP 800-30, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-137, NIST SP 800-47, CNSSP 22, CNSSI 1253, and CNSSI 4009.
A majority of time is spent on in-depth compliance review of NIST SP 800-53 controls. Instruction discusses which method should be used to test and validate each security control and what evidence should be gathered. This course is not theory or death by power point. Real scenarios are presented as exercises. A complete live cyber range simulating the IC is utilized for hands-on labs for techniques of validating and documenting compliance of NIST SP 800-53 controls as related to ICD 503.
Date/Locations:
Duration: 5 days
Course Objectives:
- Establish a baseline of RMF knowledge
- Validate essential security controls, programs, and metrics
- DoD DCD 6/3 to ICD 503 Transition
- Lab Environtment and the Cyber Range
- Overlays: Tactical, Medical, Network type(JWICS, SIPR; IC or AF), Cross Domain, PII
- Risk Assessment Report (RAR)
- Systems Security Plan (SSP)
- Security Assessment Report (SAR)
- Plans of Action and Milestone (POAM)
Prerequisites:
Experience in the field of auditing and assesments.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
AWS System Operations begins with a one day introduction to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.
The AWS course continues to flow with teaching those in a Systems Administrator or Developer Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
To continue to learn more about AWS, TechNow has the following course:
CL-425: AWS Security Operations and Architecture
Attendees to CL-415: AWS System Operations will receive TechNow approved course materials and expert instruction.
Duration: 5 Days
Audience:
This course is intended for:
• System Administrators
• Software Developers, especially those in a Developer Operations (DevOps) role
DoD 8140: Not Mandated
Course Prerequisites:
We recommend that attendees of this course have the following prerequisites:
• Background in either software development or systems administration
• Some experience with maintaining operating systems at the command line (shell scripting in Linux environments, cmd or PowerShell in Windows)
• Basic knowledge of networking protocols (TCP/IP, HTTP)
Course Objectives:
This course is designed to teach you how to:
• Understand basic data center design concepts.
• Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console.
• Understand the foundational infrastructure services, including Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Amazon Elastic Block Store (EBS), Amazon Simple Storage Service (S3), Auto Scaling, and Elastic Load Balancing (ELB).
• Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM).
• Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS).
• Understand AWS management tools, including Amazon CloudWatch and AWS Trusted Advisor.
• Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
• Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
• Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
• Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
• Monitor the health of Amazon EC2 instances and other AWS services
• Manage user identity, AWS permissions, and security in the cloud
• Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
• Select and implement the best strategy for creating reusable Amazon EC2 instances
• Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
• Edit and troubleshoot a basic AWS CloudFormation stack definition
Dates/Locations:
Course Outline:
Day 1
• Introduction and History of AWS
• AWS Infrastructure: Compute, Storage, and Networking
• AWS Security, Identity, and Access Management
• AWS Databases
• AWS Management Tools
Day 2
• System Operations on AWS Overview
• Networking in the Cloud
• Computing in the Cloud
Day 3
• Storage and Archiving in the Cloud
• Monitoring in the Cloud
• Managing Resource Consumption in the Cloud
Day 4
• Configuration Management in the Cloud
• Creating Scalable Deployments in the Cloud
• Creating Automated and Repeatable Deployments
Day 5
Full Day Lab
• Select the appropriate AWS service based on compute, data, or security requirements
• Execute steps required to provision cloud resources for selected deployment
• Identify and implement data protection, encryption, and capacity planning
• Implement and manage security policies, access controls, and role
• Implement Automation
Course Overview:
This is an introductory course into the Python scripting language. This class uses a hands-on approach in teaching the Python language. This course builds the prerequisite skills for TechNow's P-345: Python for Pentration Testers course. Getting comfortable with Python is important to understanding how Python can be utilitized for offensive measures.
This course is hands-on with the instructor walking the students through many short examples to exemplify an objective. Dexterity with the language comes through many small code examples to produce the desired result. Students have fun acquiring points for all the code examples they get correct. We must be having fun because TechNow is always amazed at how competitive students are in trying to acquire the most points!
The instructor will focus on the level that each student is currently at, and ensure the student absorbs the subject matter. Programming is not a daily tasking of administrators or offensive operators and TechNow understands that. As an instructor led course TechNow is very successful in making Python accessible to those who do not live eat and breath programming. If a student's ultimate goal is to attend a course like TechNow's P-345: Python for Pentration Testers course, then not being bogged down in the Python language is critical, and this course (P-325: Python Programming) meets that objective.
Recently we have introduced Raspberry Pi's and multiple sensors to the P-325: Python Programming course. This enables the student to actually see productive results from their coding skills in the physical world! Some examples that students create programs for are: Motion detectors, distance, temperature, cameras and keypads.
Attendees to P-325: Python Programming will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- How Python Runs Programs
- Introducing Python Object Types
- Numeric Types
- Dynamic Typing
- Variables
- Regular Expressions
- Strings
- Conditionals
- if Tests and Syntax Rules
- Lists and Dictionaries
- Tuples and Files
- Introducing Python Statements
- Assignments, Expressions, and Prints
- while and for Loops
- Iterations and Comprehensions
- Documentation
- Function Basics
- Built-In Functions
- Scopes
- Arguments
- Modules
- Module Packages and Importing
- Classes and OOP
- Operator Overloading
- Recursion
- Exception Coding Details
- Exception Objects
- Unicode and Byte Strings
- Working with Raspberry Pi
- Writing code for sensors
Prerequisites:
- Experience with some form of programming is preferred
Comments
Latest comments from students
User: slewis8435
Instructor comments: Very good instructor - he was excited about the material, very knowledgeable, and explained things clearly.
Facilities comments: The facilities were fine - plenty of room for each student to set up an extra computer and have room for note taking
User: nathan.karras
Instructor comments: Instructor was extremely knowledgeable in programming and scripting. He encouraged students to explore and ask questions. He would work with individuals to troubleshoot lab problems sets. Would highly recommend as an instructor.
Facilities comments: Room got a little warn. Instructor purchased fans to cool things off for the class. Projector had over scan.