-
Get the immersive learning experience by Al-nafi through cutting edge updated curriculum of the courses that can build you a bright future. Get Certified with our offered programs and deepen your expertise for a better career ahead. We offer dozens of courses taught by our internationally recognised and fully experienced teachers. Develop Job ready skills with Al-nafi and set yourself up for success.
-
Courses
- Career guidance for all
- Certified Information System Security Professional (CISSP) in Urdu
- Certified Information Systems Auditor (CISA) In Urdu
- Data Collection & Data Wrangling in Urdu
- R Programming
- Foundations of Artificial Intelligence
Read More -
Course Schedule for I.T
-
- Career guidance for all
- Certified Information System Security Professional (CISSP)
- Certified Information Systems Auditor (CISA
- Data Collection & Data Wrangling
- R Programming
- Foundations of Artificial Intelligence
- Introduction to Corona Virus (Covid-19)
- Linux Primer
- Python Gamma
- Python
- Linux Level 1
- SCADA, ISO 27019:2017 and NIST 800-82 connection
- Introduction to Blockchain
- MITRE Att&CK a hands on approach
- Insider threat intelligence
- ISO 27001, ISO 27017, ISO 27018 Lead Implementer & Auditor Course
- sPCI DSS Qualified Security Assessor Training
- Cyber Security Essentials Revisit after CISSP
-
- Cyber Security Briefs, Report Writing and Research
- Hacking 101 AKA ethical hacking and incident response mgmt
- Network Pentesting, and Ethical Hacking in line with various frameworks
- ISO 27019:2013 and NIST 800-82
- The Role of Unified Risk & Compliance Framework
- SCADA/ICS Security 101
- Web application Pentesting, and Ethical Hacking in line with various frameworks
- Vulnerability assessment in line with various frameworks
- ISO 2700x Standards review as per forensics
- Deep dive into network traffic analysis
- ICS/SCADA prevention and detection in line with best practices
- Intro to Open Source Tools in Forensics
- Security Operations Center Role in Cyber Security
-
- Incident Response a Hands on approach
- Windows Forensics a Hands on Approach
- Threat Hunting a hands on approach
- iOS forensics Analysis a hands on approach
- Memory Forensics a hands on approach
- Network Forensics a hands on approach
- Threat Intelligence a hands on approach
- Cell Phone Forensics a hands on approach
- Malware Analysis a hands on approach
And Many More