Al Nafi Digital Forensics and Threat Hunting (DFTH) Track

This Course is available in following languages
Urdu | English | Spanish | Arabic | Bangla | Guajrati | French | Pashtu |


Target Audience

This course is ideal for a computer science student or an IT professional who wants to excel in threat intelligence. Even if you are completely new to threat hunting, this track will take you from zero to hero in the world of incident response and cyber defense. This course is also ideal for working professionals who want a self-paced course that is 100% online.

$20.00 per year

Resident Pakistani

  • using Debit/Credit Card
PKR 2500per year

Resident Pakistani

  • using Bank Transfer/Easypaisa
$104.00 per year

Overseas Pakistanis

  • using Debit/Credit Card
$104.00 per year

Other Nationalities

  • using Debit/Credit Card

  • About This Course

    No prerequisites are required for this course. Start from scratch and truly excel in the world of threat intelligence and incident response specialist. There are 4 stages of 4 months each which include learning Python, Linux, CISSP, cybersecurity basics and then moving on to more advanced concepts including network threat hunting, windows forensic, incident response handling and much more. This course enables you to become an incident handler, exploitation analyst, cyber defence forensic analyst and much more.

  • What you will learn

    • Grasp the fundamentals of Python and Linux.
    • Prepare for the CISSP Certification.
    • Learn Cyber Security Essentials.
    • Learn Threat Hunting Techniques.
    • Perform Hands-on Network Threat Hunting.
    • Learn Cyber Defense Incident Responder techniques.

    Course Delivery Mode

    The training will be delivered online via our alnafi.com portal, which is designed to cater 50 Million Nafi members. The portal has all the key features like:

  • Earning Potentials

    The average salary of a Cyber Threat Analyst falls between $100,249 and $128,766. (Salary.com)


    What skills you will gain

    • Detect the reason behind the security breach.
    • Locate the compromised systems and apply security patches.
    • Conduct risk surveys to classify what has been compromised or altered.
    • Remediate incidents through proven techniques.
    • Establish primary sources of information on threats.
    • Track down new violations using the attacker's information

Muhammad Faisal

Instructor
Founder & CEO

He worked in UK, USA & Canada in the Federal and Private space within Cyber Security, Offensive Security, Internet of things (IoT)
25 Courses