Course Overview:

This seminar meets the objectives stated by the Federal Information Security Management Act (FISMA) where government agencies are being held accountable to ensure the protection of their information & information systems.  In order to meet the requirements of these important laws & mandates, agencies must take necessary steps to implement key information security standards.  Attend this program to gain the management skills & standards necessary to meet the requirements of these mandates.

Attendees to TN-802: Federal Information Security Management Act (FISMA) Seminar will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives:

  • Overview of current information security guidelines and requirements
  • Understand security terminology and identify employee roles
  • Information system within a performance framework
  • Step-By-Step walk-through of FISMA requirements & supporting guidance
    • Step 1: Categorizations Standards
    • Step 2: Mapping Guidelines
    • Step 3: Minimum Security Requirements
    • Step 4: Applying a Risk Management Framework
    • Step 5: Implement a System Security Plan
    • Step 6: Certification & Accreditation Application Workshop: Develop a Security Assessment Report

Prerequisites:

  • Basic computer literacy

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

TechNow understands the security threats that make your network & your company vulnerable.  We have developed a program to help you learn what those threats are, the kinds of defenses available, the language of Network Security, & how to organize yourself internally to deal with these Network Security issues.  TechNow's Corporate Risk Management course will give your team the fundamental skills & knowledge they need to develop, manage or implement your organization's Information Security Policy.

Attendees to TN-804: Corporate Risk Management will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 4 Days

Course Objectives:

  • Day 1
    • Chapter 1: What is information Security
    • Chapter 2: Types of Attacks
    • Chapter 3: Information Security Services
    • Chapter 4: Legal Issues
    • Chapter 5: Policy
  • Day 2
    • Chapter 6: Managing Risk
    • Chapter 7: Information Security Process
    • Chapter 8: Information Security Best Practices
    • Chapter 9: Internet Architecture
    • Chapter 10: Virtual Private Networks
  • Day 3
    • Chapter 11: E-Commerce Security Needs
    • Chapter 12: Encryption
    • Chapter 13: Hacker Techniques
    • Chapter 14: Intrusion Detection
  • Day 4
    • Chapter 15: UNIX Security Issues
    • Chapter 16: Windows Security Issues
    • Open Discussion

Prerequisites:

  • Basic computer literacy.

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Overview:

This course covers the key elements required to understand and apply business analysis techniques in an IT-centric business environment.  It identifies key best practices to deal with the challenges of eliciting, analyzing, and specifying project requirements.  The key material in each section of this course is reinforced with a student driven lab scenario allowing each participant hands-on practice with the key business analysis concepts that are introduced in this course. At the end of the focused sections on business analysis techniques, the students will engage in a student-driven business analysis case study blending all the learned techniques into a finished product. This course is approximately 60% lecture and  40% lab time.

Attendees to TN-512: Essential Business Analysis Course will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Overview of Business Analysis Workshop
  • Eliciting Project Workshop
  • Case Study
  • Analyzing Requirements and Writing Case Studies
  • Case Study

Prerequisites:

  • None

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!