Course Overview:

Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable sill that will help you protect your organization’s data- and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. With a CIPM and CIPP/E combined you’ll be uniquely equipped to fulfill the DPO requirements of the GDPR. Here is our CIPM + CIPP/E 4 Day GDPR Ready  

What’s Included:

  • Authorized courseware
  • Exam voucher
  • IAPP membership

**GDPR Regulation Mandated May 25, 2018**

Course Objectives:

Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP’s ANSI accredited Certified Information Privacy Manager (CIPM) certification program.

Attendees to PP-222: CIPM Certified Information Privacy Manager and GDPR Compliance will receive TechNow approved course materials and expert instruction, and certification test voucher and certificate of course completion.

TechNow is a International Association of Privacy Professionals (IAPP) Partner, and utilizes official curriculum from International Association of Privacy Professionals (IAPP).

TechNow has taught security courses for over 20 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales and compliance.

 

Document Flow Chart iconsm

Dates/Locations:

No Events

Duration: 2 Days

Course Content:

  • Module 1: Introduction to Privacy Program Management
  • Module 2: Privacy Governance
  • Module 3: Applicable Laws and Regulations
  • Module 4: Data Assessments
  • Module 5: Policies
  • Module 6: Data Subjects’ Rights
  • Module 7: Training and Awareness
  • Module 8: Protecting Personal Information
  • Module 9: Data Breach Incident Plans
  • Module 10: Measuring, Monitoring and Auditing Program Performance

 

Prerequisites: None

Target Audience:

Data Protection Officers, Data Protection Managers, Auditors, Legal Compliance Officers, Security Manager, Information Managers, Anyone who uses processes and maintains personal data

Comments

Latest comments from students


Liked the class?  Then let everyone know!

TechNow offers many courses that also have a related certification exam.  As an Authorized Peason VUE testing center, we offer exams for many certifications.  Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.

in   
 

Course Overview:

This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to maintaining a database.

Attendees to MS-6231: Maintaining a Microsoft SQL Server Database will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Installing and Configuring SQL Server
  • Managing Databases and Files
  • Disaster Recovery
  • Managing Security
  • Transferring Data
  • Automating Administrative Tasks
  • Implementation Replication
  • Maintaining High Availability
  • Monitoring SQL Server
  • Troubleshooting and Performance Tuning

Prerequisites:

  • None

Comments

Latest comments from students


User: angelangeles

Instructor comments: Clay was knowledgeable instructor with enough experience to make subject matter relatable to real world usage.



 

Liked the class?  Then let everyone know!

Course Overview:

The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.

This course is designed to assist in your exam preparation for the CISM exam.

Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.

Document Flow Chart iconsm

Dates/Locations:

Date/Time Event
11/17/2025 - 11/21/2025
08:00 -16:00
TN-825: Certified Information Security Manager (CISM) Seminar
TechNow, Inc, San Antonio TX

Duration: 5 Days

Course Objectives:

  • Information Security Governance (24%)
  • Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
  • Information Risk Management (30%)
  • Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
  • Information Security Program Development and Management (27%)
  • Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
  • Information Security Incident Management (19%)
  • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact

Prerequisites:

A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Comments

Latest comments from students


User: tracycampbell

Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing. As a bonus, his breakdown of PKI helped with my current job requirements.

Facilities comments: The Home2Suites by Hilton was FANTASTIC!



Liked the class?  Then let everyone know!

 

Course Overview: 

 

This course identifies how business analysts can elicit Agile requirements by writing user stories from use cases and personas of customer profiles.  This leads to the processes of confirming the validity and usability for quality of the product development.  An Agile Business Analyst has become a new recognized role within the other Agile Framework roles.

Attendees to PM-242:Defining Agile Requirements with User Stories will receive TechNow approved course materials and expert instruction.

Dates/Locations:

No Events

Duration: 2 Days

Course Objectives: At the conclusion of this course, students will be able to:

  • Understand the Scrum Flow, the core components of the Scrum framework
  • Understand the scope of the Product Owner role in detail
  • Understand the scope of the Agile Business Analysis role in coordination with the Product Owner, Scrum Master and Development Team
  • Understand the scope of the Scrum Master role at a high level
  • Understand the scope of the Scrum Development Team roles
  • Document the interactions between the user of a system and the system itself
  • Dive into understanding the Agile principles for requirements using user stories in a card, conversation, and confirmation format

 

Target Student:

  • Designed specifically for Agile project team members, product owners, project leaders and business analysts or anyone wanting to understand the Agile Framework.

Comments

Latest comments from students


Liked the class?  Then let everyone know!