TechNow provides an array of courses to meet our customer's requirements.  Courses that do not fit into our major course categories and custom or specialized courses appear here.  

Here are courses about specilaized Software or Hardware:

    in   

    Course Overview:

    A rigorous Pen Testing program that, unlike contemporary Pen Testing courses, teaches you how to perform an effective penetration test across filtered networks. The course requires you to Pen Test IoT systems, OT systems, builds on your ability to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and various technologies.

    What’s Included:

      • EC-Council official E-Courseware
      • EC-Council official Certificate of Attendance
      • EC-Council iLabs with access for 6 months
      • EC-Council CPENT Range access
      • CEH Exam Voucher

       

      Dates/Locations:

      No Events

      Duration: 5 days

      Course Content:

        • Module 01. Introduction to Penetration Testing
        • Module 02. Penetration Testing Scoping and Engagement
        • Module 03. Open Source Intelligence (OSINT)
        • Module 04. Social Engineering Penetration Testing
        • Module 05. Network Penetration Testing – External
        • Module 06. Network Penetration Testing – Internal
        • Module 07. Network Penetration Testing – Perimeter Devices
        • Module 08. Web Application Penetration Testing
        • Module 09. Wireless Penetration Testing
        • Module 10. IoT Penetration Testing
        • Module 11. OT/SCADA Penetration Testing
        • Module 12. Cloud Penetration Testing
        • Module 13. Binary Analysis and Exploitation
        • Module 14. Report Writing and Post Testing Actions

       

      Prerequisites:

          • Pass the CEH exam
          • Pass the CND exam

      Target Audience:

      Penetration Testers, Ethical Hackers, Information Security Consultants/ Testers/ Analysts/ Engineers, Network Server Administrators, Firewall & System Administrators, Risk Assessment Professionals

       

      Comments

      Latest comments from students


       

      Liked the class?  Then let everyone know!

    in Uncategorized  
     

    Course Overview:

    PERL programmers need a clear roadmap for improving their skills. Intermediate PERL teaches a working knowledge of PERL's objects, references, and modules — all of which makes the language so versatile and effective. This class offers a thorough introduction to intermediate programming in PERL. Topics include packages and namespaces, references and scoping, manipulating complex data structures, writing and using modules, package implementation, and using CPAN.

    Attendees to P-315: Intermediate PERL Programming will receive TechNow approved course materials and expert instruction.

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Objectives:

    • Packages and namespaces
    • References and scoping
    • Manipulating complex data structures
    • Object-oriented programming
    • Writing and using modules
    • Testing PERL code
    • Contributing to CPAN

    Prerequisites:

     

    Comments

    Latest comments from students


    User: J Masters

    Instructor comments: Instructor kept it interesting and brought a wealth of knowledge to the classroom environment. Kept a good pace and provided relevant examples.


     

    Liked the class?  Then let everyone know!

    in Uncategorized  

    Course Overview:

    Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.

    Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.

     

    Document Flow Chart iconsm

    Dates/Locations:

    No Events

    Duration: 5 Days

    Course Outline:

    Data Management

    • Define an index that satisfies a given set of requirements
    • Define and use an index template for a given pattern that satisfies a given set of requirements
    • Define and use a dynamic template that satisfies a given set of requirements
    • Define an Index Lifecycle Management policy for a time-series index
    • Define an index template that creates a new data stream

    Searching Data

    • Write and execute a search query for terms and/or phrases in one or more fields of an index
    • Write and execute a search query that is a Boolean combination of multiple queries and filters
    • Write an asynchronous search
    • Write and execute metric and bucket aggregations
    • Write and execute aggregations that contain sub-aggregations
    • Write and execute a query that searches across multiple clusters
    • Write and execute a search that utilizes a runtime field

    Developing Search Applications

    • Highlight the search terms in the response of a query
    • Sort the results of a query by a given set of requirements
    • Implement pagination of the results of a search query
    • Define and use index aliases
    • Define and use a search template

    Data Processing

    • Define a mapping that satisfies a given set of requirements
    • Define and use a custom analyzer that satisfies a given set of requirements
    • Define and use multi-fields with different data types and/or analyzers
    • Use the Reindex API and Update By Query API to reindex and/or update documents
    • Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
    •   Define runtime fields to retrieve custom values using Painless scripting

    Cluster Management

    • Diagnose shard issues and repair a cluster’s health
    • Backup and restore a cluster and/or specific indices
    • Configure a snapshot to be searchable
    • Configure a cluster for cross-cluster search
    • Implement cross-cluster replication

     

    Comments

    Latest comments from students


    Liked the class?  Then let everyone know!

    in Uncategorized  

    After you "Send" this form, within 30 seconds, status will be provided at the bottom of the form

    Acceptance to allow Your Name/Screen Name to be associated with course comments on website. (Required)

    After you "Send" this form, within 30 seconds, status will be provided at the bottom of the form

    in