Career Advancement Track in Emerging Technologies

Duration: 9-12 months
Languages: | Urdu | Hindi |

A highly specialized package which includes:

| Cyber Defence | Offensive Pentesting | Digital Forensic & Threat Hunting
SCADA/ICS | Data Science in R programming | SysOps | E Math

Created by:
Muhammad Faisal | Dr Awais | Sana Rasheed | Kazim Sheikh |

Pre-Requisites:

Educational background from any discipline.
Be able to browse the internet
Be able to use Google translator to translate articles into their native language

Course Overview

Rating :

Reviews :
300
Students Enrolled :
3705

Payment Option
12 Monthly Payments
Resident Pakistani
Others
PKR 6500
US$ 85

Annual Payments
Resident Pakistani
Others
PKR 75000
US$ 974

Note :
User opted for annual payment will have instant access to the full content of the whole track.
User opted for monthly payment plan will have access to the content Al Nafi makes available on monthly basis.

About This Course

This is a highly specialized package which includes world class training within multiple domains. We teach you from the ground up and ensure that you are ready with the right theory, practice and hands on activities. If you spend 2-3 hours a day studying as directed, within 6-9 months time you will be ready for jobs both locally within your country or internationally, or working as a freelancer within multiple domains, like Cyber Security, Offensive Security, DFTH, SCADA/ICS, Data Science and Cloud Computing. You are trained by world experts who are at the top of their prime within their careers working globally at senior levels. This is a defined path and it comes with detailed planning and commitment from your end. We will provide all the tools at our disposal to ensure that you are successful, but it requires serious commitment. Only commit if you are serious enough to take that leap towards success. You have two choices, either break the glass ceiling and head your way up or stay where you are and continue your journey on the path you are. This track will lead you to earn 6 figures in 2-3 years with proper commitment of time, and dedication

What you will learn


Python Primer

Python Primer

Python Alpha

Python Beta

Python Gamma

Linux Primer

Linux Alpha

Linux Beta

CISSP Preparation

ISO 27001, 27017, 27018 Lead Implementer

Cyber Security Essentials Revisit 

ISO 27001 Hands on Approach

CIS Top 18 Controls 

Hacking 101 a Hands on Approach

SCADA, ISO 27019:2013 & NIST 800-82 Connection

SCADA Security 101

SCADA Prevention and Detection a Hands on approach

SIEM a hands on approach

PCI DSS QSA Training

Vulnerability assessment in line with various frameworks

Web application Pentesting, & Ethical Hacking in line with various frameworks 

Network Pentesting, & Ethical Hacking in line with various frameworks 

Bug Bounty Hunting

ISO 2700x Standards review as per Digital Forensics

Intro to Open Source tools in Forensics

Network Threat Hunting 

Security Operations Center Role in Cyber Security  

Incident Response a Hands on approach

Windows Forensics

iOS forensics Analysis and IRM

Memory Forensics

Network Forensics

Threat Intelligence

Cell Phone Forensics

Malware Analysis and Reverse Engineering


Introduction of Data Science

R Programming

Data Collection and Data Wrangling

Exploratory Data Analysis

Machine Learning: Supervised Learning

Machine Learning: Unsupervised Learning

Capstone Project

Data Visualization


Linux Fundamentals

User & Network Administration

Server Apps

Core Admin


Linear Algebra – Matrix theory and its real world applications

Probability – as a tool for decision making under uncertain circumstances

Statistics

Calculus and Optimization

Vulnerability Assessment Labs

Web Application Pentesting Labs

Network Pentesting Labs

How to be a bug bounty hunter

CIS Critical Control Labs

PCI DSS Labs

ISO 27001 Labs

Mobile Hacking Labs

GCP vs OVH vs Azure vs AWS Pentesting Labs

All things wireless labs

Advanced Web App pentesting labs

Exploit Development Labs

Digital Forensics Labs

HIPAA Labs

NIST Cyber Security Framework Labs

IASME Governance Standard Labs

SOC 1, 2, 3 Type I and 2 labs

TC Cyber Labs

HITRUST CSF

CISQ Labs

FEDRAMP Labs

GDPR Labs

FISMA Labs

NY DFS Labs

FFIEC Labs

NERC CIP Labs


What skills you will gain


Python Primer

Python Alpha

Python Beta

Python Gamma

Linux Primer

Linux Alpha

Linux Beta

CISSP Preparation

ISO 27001, 27017, 27018 Lead Implementer

Cyber Security Essentials Revisit 

ISO 27001 Hands on Approach

CIS Top 18 Controls 

Hacking 101 a Hands on Approach

SCADA, ISO 27019:2013 & NIST 800-82 Connection

SCADA Security 101

SCADA Prevention and Detection a Hands on approach

SIEM a hands on approach

PCI DSS QSA Training

Vulnerability assessment in line with various frameworks

Web application Pentesting, & Ethical Hacking in line with various frameworks 

Network Pentesting, & Ethical Hacking in line with various frameworks 

Bug Bounty Hunting

ISO 2700x Standards review as per Digital Forensics

Intro to Open Source tools in Forensics

Network Threat Hunting 

Security Operations Center Role in Cyber Security  

Incident Response a Hands on approach

Windows Forensics

iOS forensics Analysis and IRM

Memory Forensics

Network Forensics

Threat Intelligence

Cell Phone Forensics

Malware Analysis and Reverse Engineering


Data Science

Data Cleansing

Cluster Analysis

Machine Learning

Github

Data Analysis

Debugging

Data Manipulation

R Programming

Exploratory Data Analysis

R studio

Regular Expression (REGEX)


Monitor activity and changes on a server with Linux Audit and AIDE.

Protect data from compromise with storage encryption.

Troubleshoot boot/ security/storage/network issues.

Create and manage highly available services.


Develop mathematical model of linear systems

Solving system of linear equations and understanding its geometry

Geometry of linear equations

Application of mathematics to real world problems

Analytical and computation skills in the topics covered

Understand the mathematics and geometry of optimization


Vulnerability Assessment Labs

Web Application Pentesting Labs

Network Pentesting Labs

How to be a bug bounty hunter

CIS Critical Control Labs

PCI DSS Labs

ISO 27001 Labs

Mobile Hacking Labs

GCP vs OVH vs Azure vs AWS Pentesting Labs

All things wireless labs

Advanced Web App pentesting labs

Exploit Development Labs

Digital Forensics Labs

HIPAA Labs

NIST Cyber Security Framework Labs

IASME Governance Standard Labs

SOC 1, 2, 3 Type I and 2 labs

TC Cyber Labs

HITRUST CSF

CISQ Labs

FEDRAMP Labs

GDPR Labs

FISMA Labs

NY DFS Labs

FFIEC Labs

NERC CIP Labs

Course Content

Python Primer

Python Alpha

Python Beta

Python Gamma

Linux Primer

Linux Alpha

Linux Beta

CISSP Preparation

ISO 27001, 27017, 27018 Lead Implementer

Cyber Security Essentials Revisit

ISO 27001 Hands on Approach

CIS Top 18 Controls

Hacking 101 a Hands on Approach

SCADA, ISO 27019:2013 & NIST 800-82 Connection

SCADA Security 101

SCADA Prevention and Detection a Hands on approach

SIEM a hands on approach

PCI DSS QSA Training

Vulnerability assessment in line with various frameworks

Web application Pentesting, & Ethical Hacking in line with various frameworks

Network Pentesting, & Ethical Hacking in line with various frameworks

Bug Bounty Hunting

ISO 2700x Standards review as per Digital Forensics

Intro to Open Source tools in Forensics

Network Threat Hunting

Security Operations Center Role in Cyber Security

Incident Response a Hands on approach

Windows Forensics

iOS forensics Analysis and IRM

Memory Forensics

Network Forensics

Threat Intelligence

Cell Phone Forensics

Malware Analysis and Reverse Engineering

Introduction of Data Science

R Programming

Data Collection and Data Wrangling

Exploratory Data Analysis

Machine Learning: Supervised Learning

Machine Learning: Unsupervised Learning

Capstone Project

Data Visualization

Linux Fundamentals

User & Network Administration

Server Apps

Core Admin

Linear Algebra – Matrix theory and its real world applications

Probability – as a tool for decision making under uncertain circumstances

Statistics

Calculus and Optimization

Web Application Pentesting Labs

Network Pentesting Labs

How to be a bug bounty hunter

CIS Critical Control Labs

PCI DSS Labs

ISO 27001 Labs

Mobile Hacking Labs

GCP vs OVH vs Azure vs AWS Pentesting Labs

All things wireless labs

Advanced Web App pentesting labs

Exploit Development Labs

Digital Forensics Labs

HIPAA Labs

NIST Cyber Security Framework Labs

IASME Governance Standard Labs

SOC 1, 2, 3 Type I and 2 labs

TC Cyber Labs

HITRUST CSF

CISQ Labs

FEDRAMP Labs

GDPR Labs

FISMA Labs

NY DFS Labs

FFIEC Labs

NERC CIP Labs

Ghanimah Standard Coverage

CODS Track

Ghanimah Industries Focus

Study Plan

Meet your Trainers




No. of Courses :
25
Rating :

Reviews :
1941
Students Enrolled :
3922

Muhammad Faisal,

Lead Trainer & Founder

Muhammad Faisal, Founder, and CEO of AL Nafi has worked in UK, USA & Canada in the Federal and Private space within Cyber Security, Offensive Security, Internet of things (IoT), Blockchain, Augmented Computing, Artificial Intelligence, and Quantum Resistant Encryption.



No. of Courses :
02
Rating :
waiting
Reviews :
waiting
Students Enrolled :
Waiting

Kazim Shaikh

Trainer

He is a passionate and dedicated Information Technology professional who has started his career as Solaris/Unix Admin since 2009. He has spent more than eleven years providing pragmatic Information Technology & holds a Leadership role of Assistant Vice President of IT Infrastructure at major organization.



No. of Courses :
05
Rating :

Reviews :
255
Students Enrolled :
3299

Sana Rasheed,

Trainer

Sana Rasheed hails from Pakistan and is currently working at Accenture in Eastern Europe as Lead Data Scientist.



No. of Courses :
04
Rating :
waiting
Reviews :
waiting
Students Enrolled :
waiting

Dr Awais

Trainer

I am Dr Awais and I hail from Islamabad. I have a PhD in electrical engineering and my primary area of research is in control systems, optimization, robotics and Artificial Intelligence.

PKR 75,000 per year

Resident Pakistani

  • using Debit/Credit Card/
    EasyPaisa
PKR 75,000per year

Resident Pakistani

  • using Bank Transfer/PayPro

$974per year

Overseas Pakistanis

  • using Debit/Credit Card

$974 per year

Other Nationalities

  • using Debit/Credit Card

PKR 6,500 per month

Resident Pakistani

  • using Debit/Credit Card/
    EasyPaisa
PKR 6,500per month

Resident Pakistani

  • using Bank Transfer/PayPro

$85 per month

Overseas Pakistanis

  • using Debit/Credit Card

$85per month

Other Nationalities

  • using Debit/Credit Card