Course Overview:

Everyday, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information you need to stay ahead of breaches-and help advance your career. CIPP/E training gives you comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe. With a CIPP/E and CIPM certification combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

What’s Included:

  • Authorized courseware
  • Exam voucher
  • IAPP membership

**GDPR Regulation Mandated May 25, 2018**

Course Objectives:

Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
The training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program.

Attendees to PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 2 Days

Course Content:

  • Module 1: Data Protection Laws
  • Module 2: Personal Data
  • Module 3: Controllers and Processors
  • Module 4: Processing Personal Data
  • Module 5: Information Provision
  • Module 6: Data Subjects’ Rights
  • Module 7: Security of Processing
  • Module 8: Accountability
  • Module 9: International Data Transfers
  • Module 10: Supervisions and Enforcement
  • Module 11: Compliance.

 

Prerequisites: None

Target Audience:

Data Protection Officers, Data Protection Lawyers, Records Managers, Information Officers, Compliance Officers, Human Resource Officers, Anyone who uses processes and maintains personal data

Comments

Latest comments from students


Liked the class?  Then let everyone know!

    After you press "Request Information" near the bottom of this form, within 30 seconds, status will be provided at the bottom of the form

    Tech Now can provide on-site training anywhere in the world. We'll customize a training package to meet your needs!

    First Name*

    Last Name*

    Your Email*

    Your Company*

    Your State*

    Area of Interest

    Phone

    Questions:

    After you press "Request Information" on this form, within 30 seconds, status will be provided at the bottom of the form

    from page:

    in   
     

    Course Overview:

    CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.  Cloud Essentials is a vendor-neutral credential designed to validate the candidate has an understanding of basic terms and definitions of cloud computing along with the different processes involved in the successful adoption of cloud computing and its implications for organizations’ use.

    TechNow is a CompTIA partner and uses official CompTIA Cloud Essentials+ curriculum.

    Attendees to CT-213: Cloud Essentials+ will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    Date/Time Event
    03/30/2026 - 04/01/2026
    08:00 -16:00
    CT-213: Cloud Essentials+
    TechNow, Inc, San Antonio TX
    06/15/2026 - 06/17/2026
    08:00 -16:00
    CT-213: Cloud Essentials+
    TechNow, Inc, San Antonio TX
    10/13/2026 - 10/15/2026
    08:00 -16:00
    CT-213: Cloud Essentials+
    TechNow, Inc, San Antonio TX

    Course Duration: 3 days

    Course Objectives:

    • Domain 1 : Cloud Concepts
      • Understand cloud principles
      • Identify cloud networking concepts & storage techniques
      • Understand cloud design aspects
    • Domain 2: Business Principles of Cloud Environments
      • Identify and employ appropriate cloud assessments like feasibility studies, benchmarking, or gap analysis
      • Highlight key business aspects of cloud vendor relation adoption, and comprehend cloud migration approaches
    • Domain 3: Management and Technical Operations
      • Explain aspects of operating within the cloud, such as data management or optimization
      • Understand the role of DevOps in cloud environments, like API integration or provisioning
    • Domain 4: Governance, Risk, Compliance and Security for the Cloud
      • Understand risk management and response concepts related to cloud services and identify the importance and impacts of compliance in the cloud, such as regulatory concerns or international standards.

     

    Course Prerequisites:

    • CompTIA recommends that a candidate have at least 6 months of experience in an IT environment, with direct involvement in IT-related tasks responsibilities and/or decision making.

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!

     

    Course Overview:

    TechNow has worked worldwide enterprise infrastructures for over 30 years and has developed demos and labs to exemplify the techniques required to demonstrate technologies that effectively support CTI.  This course integrates well with our courses TN-575: Open Source Network Security Monitoring and TN-865: Wireshark Network Traffic and Security Analysis .

    TechNow develops Cyber Ranges and makes them available for conferences in support of annual meetings for Cyber Threat Response Teams.  Developing scenarios and reacting to them appropriately is a big part of the value in understanding the contexts required to comprehend valuable CTI.   As with many advanced TechNow security courses, there is a large hands-on ratio.  This course helps Cyber Protection Teams (CPT), Defensive Cyber Operations (DCO), and Mission Defense Teams (MDT) to collect, analyze and apply targeted cyber intelligence to defensive operations in order to proactively act on and tune response to attacks by cyber adversaries.  CPT, DCO, and MDT can take preemptive action by utilizing CTI, understanding CTI tools, techniques and procedures (TTPs) needed to generate and consume timely and relevant intelligence to improve resilience and prevention.

    This course focuses on the collection, classification, and exploitation of knowledge about adversaries and their TTPs. .  MDT puts us close the mission and helps define the internal context to be analyzed against the CTI.  TechNow pushes the student to truly understand how to think about and use CTI to make a difference.

    Attendees to TN-905: Cyber Threat Intelligence Analysis will receive TechNow approved course materials and expert instruction.

    Date/Locations:

    No Events

    Course Duration: 5 days

    Course Objectives:

    • Learn to comprehend and develop complex scenarios
    • Identify and create intelligence requirements through practices such as threat modeling
    • Utilize threat modeling to drive intelligence handling and practices 
    • Breakdown tactical, operational, and strategic-level threat intelligence
    • Generate threat intelligence to detect, respond to, and defeat focused and targeted threats
    • How to collect adversary information creating better value CTI
    • How to filter and qualify external sources, mitigating low integrity intelligence
    • Create Indicators of Compromise (IOCs) in formats such as YARA, OpenIOC, and STIX
    • Move security maturity past IOCs into understanding and countering the behavioral tradecraft of threats
    • Breaking down threats mapped against their tradecraft to tweak IOCs
    • Establish structured analytical techniques to be successful in any security role
    • Learn and apply structured principles in support of CTI and how to communicate that to any security role.

    Course Prerequisites:

    Comments

    Latest comments from students


     

    Liked the class?  Then let everyone know!