Course Overview:
Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.
Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.
Dates/Locations:
Duration: 5 Days
Course Outline:
Data Management
- Define an index that satisfies a given set of requirements
- Define and use an index template for a given pattern that satisfies a given set of requirements
- Define and use a dynamic template that satisfies a given set of requirements
- Define an Index Lifecycle Management policy for a time-series index
- Define an index template that creates a new data stream
Searching Data
-
Write and execute a search query for terms and/or phrases in one or more fields of an index
-
Write and execute a search query that is a Boolean combination of multiple queries and filters
-
Write an asynchronous search
-
Write and execute metric and bucket aggregations
-
Write and execute aggregations that contain sub-aggregations
-
Write and execute a query that searches across multiple clusters
-
Write and execute a search that utilizes a runtime field
Developing Search Applications
-
Highlight the search terms in the response of a query
-
Sort the results of a query by a given set of requirements
-
Implement pagination of the results of a search query
-
Define and use index aliases
-
Define and use a search template
Data Processing
-
Define a mapping that satisfies a given set of requirements
-
Define and use a custom analyzer that satisfies a given set of requirements
-
Define and use multi-fields with different data types and/or analyzers
-
Use the Reindex API and Update By Query API to reindex and/or update documents
-
Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
-
Define runtime fields to retrieve custom values using Painless scripting
Cluster Management
-
Diagnose shard issues and repair a cluster’s health
-
Backup and restore a cluster and/or specific indices
-
Configure a snapshot to be searchable
-
Configure a cluster for cross-cluster search
-
Implement cross-cluster replication
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.
What’s Included:
-
- EC-Council official E-Courseware
- EC-Council official Certificate of Attendance
- EC-Council iLabs with access for 6 months
- EC-Council CPENT Range access
- CEH Exam Voucher
Dates/Locations:
Duration: 5 days
Course Content:
-
- Module 01. Introduction to Penetration Testing
- Module 02. Penetration Testing Scoping and Engagement
- Module 03. Open Source Intelligence (OSINT)
- Module 04. Social Engineering Penetration Testing
- Module 05. Network Penetration Testing – External
- Module 06. Network Penetration Testing – Internal
- Module 07. Network Penetration Testing – Perimeter Devices
- Module 08. Web Application Penetration Testing
- Module 09. Wireless Penetration Testing
- Module 10. IoT Penetration Testing
- Module 11. OT/SCADA Penetration Testing
- Module 12. Cloud Penetration Testing
- Module 13. Binary Analysis and Exploitation
- Module 14. Report Writing and Post Testing Actions
Prerequisites:
-
-
- Pass the CEH exam
- Pass the CND exam
Target Audience:
Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.
TechNow has been training IT, programming, and Cyber Security for over 28 years. Artificial Intelligence skills are being developed across many enterprises.
Here is our list of Artificial Intelligence and Machine Learning related courses.
TechNow offers many courses that also have a related certification exam. As an Authorized Peason VUE testing center, we offer exams for many certifications. Pearson VUE offers exams for a wide array of certifications that includes the IT certs of Cisco, EC-Council, CompTIA, and SANS.