Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
-
-
- Pass the CEH exam
- Pass the CND exam
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.
Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.
Dates/Locations:
Duration: 5 Days
Course Outline:
Data Management
- Define an index that satisfies a given set of requirements
- Define and use an index template for a given pattern that satisfies a given set of requirements
- Define and use a dynamic template that satisfies a given set of requirements
- Define an Index Lifecycle Management policy for a time-series index
- Define an index template that creates a new data stream
Searching Data
-
Write and execute a search query for terms and/or phrases in one or more fields of an index
-
Write and execute a search query that is a Boolean combination of multiple queries and filters
-
Write an asynchronous search
-
Write and execute metric and bucket aggregations
-
Write and execute aggregations that contain sub-aggregations
-
Write and execute a query that searches across multiple clusters
-
Write and execute a search that utilizes a runtime field
Developing Search Applications
-
Highlight the search terms in the response of a query
-
Sort the results of a query by a given set of requirements
-
Implement pagination of the results of a search query
-
Define and use index aliases
-
Define and use a search template
Data Processing
-
Define a mapping that satisfies a given set of requirements
-
Define and use a custom analyzer that satisfies a given set of requirements
-
Define and use multi-fields with different data types and/or analyzers
-
Use the Reindex API and Update By Query API to reindex and/or update documents
-
Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
-
Define runtime fields to retrieve custom values using Painless scripting
Cluster Management
-
Diagnose shard issues and repair a cluster’s health
-
Backup and restore a cluster and/or specific indices
-
Configure a snapshot to be searchable
-
Configure a cluster for cross-cluster search
-
Implement cross-cluster replication
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC²)®’s seven domains.
Attendees to TN-715: Systems Security Certified Practitioner (SSCP) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Access Controls
- Security Operations and Administration
- Analysis and Monitoring
- Cryptography
- Networks and Telecommunications
- Malicious Code/Malware
- Risk, Response, and Recovery
Prerequisites:
- One year security experience
- Some knowledge of the (ISC²)®’s seven domains
Comments
Latest comments from students
User: boyleb15
Instructor comments: Instructor was very knowledgeable on most items covered during this course. There were some topics he did lack the answer to. Instructor would also get sidetracked easily
User: keginth
Instructor comments: he was phenomenal with test prep and knew the book well
Facilities comments: adequate
Like the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. Artificial Intelligence skills are being developed across many enterprises.
Here is our list of Artificial Intelligence and Machine Learning related courses.