Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.
Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.
Dates/Locations:
No Events
Duration: 5 Days
Course Outline:
Data Management
Define an index that satisfies a given set of requirements
Define and use an index template for a given pattern that satisfies a given set of requirements
Define and use a dynamic template that satisfies a given set of requirements
Define an Index Lifecycle Management policy for a time-series index
Define an index template that creates a new data stream
Searching Data
Write and execute a search query for terms and/or phrases in one or more fields of an index
Write and execute a search query that is a Boolean combination of multiple queries and filters
Write an asynchronous search
Write and execute metric and bucket aggregations
Write and execute aggregations that contain sub-aggregations
Write and execute a query that searches across multiple clusters
Write and execute a search that utilizes a runtime field
Developing Search Applications
Highlight the search terms in the response of a query
Sort the results of a query by a given set of requirements
Implement pagination of the results of a search query
Define and use index aliases
Define and use a search template
Data Processing
Define a mapping that satisfies a given set of requirements
Define and use a custom analyzer that satisfies a given set of requirements
Define and use multi-fields with different data types and/or analyzers
Use the Reindex API and Update By Query API to reindex and/or update documents
Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
Define runtime fields to retrieve custom values using Painless scripting
Cluster Management
Diagnose shard issues and repair a cluster’s health
Backup and restore a cluster and/or specific indices
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
EC-Council official E-Courseware
EC-Council official Certificate of Attendance
EC-Council iLabs with access for 6 months
EC-Council CPENT Range access
CEH Exam Voucher
Dates/Locations:
No Events
Duration: 5 days
Course Content:
Module 01. Introduction to Penetration Testing
Module 02. Penetration Testing Scoping and Engagement
CompTIA SecAI+ is the first certification in CompTIA’s expansion series, designed to help you secure, govern and responsibly integrate artificial intelligence into your cybersecurity operations. You’ll build the skills to defend AI systems, meet global compliance expectations and use AI to enhance threat detection, automation and innovation—so you can strengthen your expertise and help keep your organization’s systems and data secure.
SecAI+ helps you build practical AI security and automation skills on top of your existing expertise, so you can secure AI deployments, use AI‑assisted security tools with confidence, and stay ready for the next step in your cybersecurity career.
Course Objectives:
Apply AI concepts to strengthen your organization’s cybersecurity posture
Secure AI systems using advanced controls and protections to safeguard data, models, and infrastructure
Leverage AI technologies to automate workflows, accelerate incident response, and scale security operations
Navigate global GRC frameworks to ensure ethical and compliant AI adoption across industries
Defend against AI-driven threats like adversarial attacks, automated malware, and malicious use of generative AI
Integrate AI securely into DevSecOps pipelines and enterprise security strategies.
Dates/Locations:
No Events
Prerequisites: Recommended experience: 3–4 years in IT and 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended
SecAI+ (V1) exam objectives summary
Basic AI concepts related to cybersecurity (17%)
Explain core AI principles and terminology: Machine learning, deep learning, natural language processing, and automation.
Identify AI applications in security: Use cases for AI in threat detection, defense, and security operations.
Recognize AI-driven threats: Automated phishing, polymorphic malware, adversarial machine learning, and malicious use of generative AI.
Securing AI systems (40%)
Implement security controls: Protect AI systems, data, and models using robust technical safeguards.
Secure AI deployment environments: Apply best practices across on-premises, cloud, and hybrid infrastructures.
Mitigate adversarial risks: Defend against attacks targeting AI models, data pipelines, and inference layers.
AI-assisted security (24%)
Enhance detection and response: Use AI-driven tools to identify anomalies, detect threats, and accelerate incident remediation.
Automate security workflows: Integrate AI for event triage, alert correlation, and response orchestration.
Apply AI techniques in operations: Incorporate AI into threat modeling, behavior analysis, and continuous monitoring.
AI governance, risk, and compliance (19%)
Understand regulatory frameworks: Identify global governance requirements and their implications for AI adoption.
Integrate GRC into AI projects: Incorporate governance, risk management, and compliance practices throughout the AI lifecycle.
Ensure responsible AI use: Apply ethical guidelines, legal standards, and industry frameworks such as GDPR and NIST AI RMF.