Course Overview:

Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.

Course Objectives:

  • Install and troubleshoot Ansible on central nodes and managed hosts
  • Automate administration tasks with Ansible playbooks and ad hoc commands
  • Write effective Ansible playbooks
  • Protect sensitive data used by tasks with Ansible Vault.
  • Install and configure Ansible Tower for enterprise Ansible management
  • Use Ansible Tower to control access to inventories and machine credentials by users and teams
  • Create job templates in Ansible Tower to standardize playbook execution.
  • Centrally launch playbooks and monitor and review job results with Ansible Tower

 

Course Outline:

  • Introduce Ansible
  • Deploy Ansible
  • Implement playbooks
  • Manage variables and inclusions
  • Implement task control
  • Implement Jinja2 templates
  • Implement roles
  • Configure complex playbooks
  • Implement Ansible Vault
  • Troubleshoot Ansible
  • Install Ansible Tower and describe Ansible Tower’s architecture
  • Create users and teams for role-based access control
  • Create and manage inventories and credentials
  • Manage projects for provisioning with Ansible Tower
  • Construct advanced job workflows
  • Update inventories dynamically and compare inventory members
  • Maintenance and administration of Ansible Tower

 
Dates/Locations:

No Events

Duration: 5 Days

Prerequisites:

  • Become a Red Hat Certified System Administrator, or demonstrate equivalent experience

Target Audience:

This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.

 

Course Overview:

This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010 (including pre-released versions of the product).

Attendees to MS-10231: Designing a Microsoft SharePoint 2010/2013 Infrastructure will receive TechNow approved course materials and expert instruction.

Date/Location:

No Events

Duration: 5 days

Course Objectives:

  • Designing a Logical Architecture
  • Planning Service Application Architecture
  • Planning for Performance and Capacity
  • Designing a Physical Architecture
  • Designing a Security Plan
  • Planning Authentication
  • Planning Managed Metadata
  • Planning Social Computing
  • Designing Enterprise Search Strategy
  • Planning Enterprise Content Management
  • Developing a Plan for Governance
  • Designing a Maintenance and Monitoring Plan

Prerequisites:

  • At least 2 years experience administering, deploying, managing, monitoring, upgrading, migrating, and designing SharePoint servers
  • At least one year’s experience of mapping business requirements to logical and physical technical design
  • Working knowledge of network design, including network security

Comments

Latest comments from students


 

Liked the class?  Then let others know!

 

Course Overview: Clear and detailed discussion on the following course content:

  • What is the Agile Adaptive  Methodology versus the Predictive (waterfall) Methodology?
  • The Agile Value Proposition, by explanation of the Agile Manifesto and Agile Principles.
  • What is the Scrum Framework by explanation of Scrum Roles, Ceremonies and Artifacts?
  • What are the artifacts of Product Planning, Release Planning and Sprint Planning?
  • What are the Agile impacts to corporate team structures and stakeholder alignment?
  • What are Agile myths and why an Agile transformation will fail?
  • What are Agile (hybrid) tailoring considerations?


Attendees to PM-221: Agile Overview for Executives and Leaderswill receive TechNow approved course materials and expert instruction.

 

Dates/Locations:

No Events

Duration: 1 Days

Course Objectives: Are you and executive or leader in your organization and interested in learning about Agile principles? This course details the Agile framework that uses an adaptive life cycle, specifically related to using the Scrum approach.

Upon successful completion of this course, students will be able to:

  • Understand an overview of the main aspects that leadership must know to implement strategic opportunities with Agile principles for product quality and on-time product delivery
  • Participants will dive into understanding the strategic and tactical elements of implementing Agile and Scrum into their organization
  • Receive details on how to understand the organizational impact that the Agile transformation could have on the different aspects of your current business processes

Target Student:

  • Designed specifically for leaders and senior managers or anyone wanting to understand the high-level basics of the Agile Framework

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

PP-244: CIPM + CIPP/E 4 Day GDPR Ready

 

Course Overview:

A combined course of CIPM + CIPP/E. Achieving a CIPM credential shows that you have a comprehensive knowledge of how data protection programs should work across an organization. Combine with a CIPP/E credential and prove that you not only can manage a data protection program, but you understand the regulations that govern them.

With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. The CIPP/E relates to the knowledge a DPO must have concerning the European legal framework of the legislation, and the CIPM provides theoretical aspects necessary to lead an organization’s data protection policy.

The General Data Protection Regulation (GDPR) takes effect in 2018. Among its mandates is the requirement to appoint a knowledgeable Data Protection Officer (DPO) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There’s a lot to know, there’s a lot at stake and there’s a lot of opportunity for data protection professionals with the right training and education. 

What’s Included:

  • Authorized courseware
  • 2 Exam vouchers
  • IAPP membership

**GDPR Regulation Mandated May 25, 2018**

Course Objectives:

See individual courses for details: PP-212: CIPP/E Certified Information Privacy Professional Europe and GDPR Compliance

See individual courses for details: PP-222 CIPM Certified Information Privacy Manager and GDPR Compliance

Attendees to PP-244: CIPM + CIPP/E 4 Day GDPR Ready will receive TechNow approved course materials and expert instruction, and certification test vouchers and certificate of course completion.

TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with international sales and compliance.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 4 Days

Course Content:

 

Prerequisites: None

Target Audience:

Data Protection Officers, Data Protection Managers, Auditors, Data Protection Lawyers, Records Managers, Information Officers, Legal Compliance Officers, Human Resource Officers, Security Manager, Information Manager, Anyone who uses processes and maintains personal data

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

This course will cover topics to ensure that students have the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.  Students will be able to apply critical thinking and judgement across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers.  This course will prepare students for the objectives covered in the CompTIA CASP+ certification exam (CAS-004).

Attendees to CT-425: CompTIA Advanced Security Practitioner (CASP+) will receive TechNow approved course materials and expert instruction.

Date/Locations:

Date/Time Event
12/16/2024 - 12/20/2024
08:00 -16:00
CT-425: CASP+
TechNow, Inc, San Antonio TX

Duration: 5 days

Course Objectives:

  • Support IT governance in the enterprise with an emphasis on managing risk
  • Leverage collaboration tools and technology to support enterprise security
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
  • Implement cryptographic techniques
  • Implement security controls for hosts
  • Implement security controls for mobile devices
  • Implement network security
  • Implement security in the systems and software development lifecycle
  • Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
  • Conduct security assessments
  • Respond to and recover from security incidents

Prerequisites:

Completion of the following or equivalent knowledge:

CompTIA Certification: A+ Essentials

CompTIA Certification: Security+

Comments

Latest comments from students


User: clbrack

Instructor comments: I expect to pass, another great class from technow!


User: christopher0470

Instructor comments: Alan takes the time to cover the material so that you understand the concepts and applications of the information presented.

Facilities comments: I like the location. It was quiet and very conducive to learning.


Liked the class?  Then let everyone know!