Al Nafi Offensive Pentesting Track

Breaking into computer networks, bypassing firewalls to see what’s happening on the other side sounds fun. However, doing it all ethically is what we teach here at AlNafi.
Do you want to save thousands of companies from hacking attacks and earn thousands of dollars along the way?
Then we welcome you here at AlNafi as this course is going to take you from the basics of hacking, offensive pentesting, and threat intelligence to an elite level.
For those who already have a background in security, this course will take their skills to a much higher level. Become an offensive cybersecurity expert today!


No. of Courses :
25
Rating :

Reviews :
126
Students Enrolled :
3559

Muhammad Faisal

Lead Trainer Founder & CEO

He worked in UK, USA & Canada in the Federal and Private space within Cyber Security, Offensive Security,
25 Courses


About This Course

This is a deep dive into the world of offensive penetration testing. In this course, you'll develop a deep understanding of Python, Linux and a solid grip on pentesting tools like Wireshark, Nmap, etc. We'll teach you basic to the most advanced methods of finding vulnerabilities through pentesting techniques like information gathering, create exploits and be able to escalate privileges.


What you will learn

    1. set up your environment for performing penetration testing with Kali Linux
    2. Enumerate/scan systems with Netdiscover, Nmap, Dirb, Nikto, etc.
    3. Use and modify public exploits
    1. Recognize legit public exploits from fake exploits
    2. Use several techniques to gain access to a system from both remote and local side
    3. Use several techniques to escalate privileges
    1. Exploitation of SQL Injection,XSS,LFI & RFI,Command Injection etc.
    2. Perform remote exploitation of systems And much more.

What skills you will gain

    1. Establish critical procedures, strategies and processes that can be quickly put into effect
    2. Be assured that you are willing to secure the organisation and fulfil the needs of stakeholders
    1. Establish the foundation for your own method of information security management (ISMS)
    2. To improve your ISMS system and build expertise and information security support through your organisation, acquire knowledge
    1. Promote consistent professional progress through the organisation

Earning Potentials

Cyber Security jobs requiring ISO 27001 qualifications are now starting at $70,000 and rising up to $120,000. (IT Governance USA)
  • Course Delivery Mode

    The training will be delivered online via our alnafi.com portal, which is designed to cater 50 Million Nafi members. The portal has all the key features like:
    • Watching and tracking videos
    • Progress monitoring,
    • Attempting quizzes,
    • Submitting assignments,
    • Asking questions from the teachers and mentors

Course Curriculum

Stage 1
(Duration 3 Months)

  • Python Primer
  • Linux Primer
  • Python Alpha
  • Python Beta
  • Linux Level 1
  • CISSP prep
  • Cyber Security Essentials Revisit

Stage 2
(Duration 3 Months)

  • ISO 27001, 27017, 27018 Lead Implementer
  • Hacking 101 a hands on approach
  • How to upgrade your resume to make career in Offensive Pentesting track
  • Linux Level 2 Bash

Stage 3
(Duration 3 Months)

  • Detecting Insider Threat an Introduction
  • MITRE ATTACK a hands on approach
  • Packet Analysis a hands on approach


Stage 4
(Duration 6 Months)

  • Vulnerability Assessment in Line with various frameworks and standards
  • Network Pentesting & ethical Hacking in line with various frameworks and standards
  • How to hunt for Bug Bounties

$20.00 per year

Resident Pakistani

  • using Debit/Credit Card
PKR 2500per year

Resident Pakistani

  • using Bank Transfer/Easypaisa
$104.00 per year

Overseas Pakistanis

  • using Debit/Credit Card
$104.00 per year

Other Nationalities

  • using Debit/Credit Card
$104.00 per year

Arabic Language

  • using Debit/Credit Card

Social proof: reviews

1- Linux Level 2 or call it 3 its just Bash

Adnan Haider

Bash teaching methodology by Faisal Bahi is superb

Bash teaching methodology by Faisal Bahi is superb

Read Less

2- Linux Level 2 or call it 3 its just Bash

Khushboo Soomro

Wonderful, I like the course

Wonderful, I like the course

Read Less

1- Linux Level 1

MUHAMMAD SIRAJ HUSSAIN

This course design Easy a learning lesson

This course design Easy a learning lesson

Read Less

2- Linux Level 1

Muhammad Shahbaz

Excellent

Excellent

Read Less

1- Certified Information System Security Professional (CI...

azeem raza

good

2- Certified Information System Security Professional (CI...

Maryam Abdul Ghafoor

security and risk management, superb excellent

security and risk management, superb excellent

Read Less

3- Certified Information System Security Professional (CI...

MUHAMMAD SIRAJ HUSSAIN

Cissp is a very important subject, sir Faisal is a very good teacher to tech very variety of knowledge, I am very thankful for teaching the subject

Cissp is a very important subject, sir Faisal is a very good teacher to tech very variety of knowledge, I am very thankful for teaching the subject

Read Less

4- Certified Information System Security Professional (CI...

Arshad Ali

Excellent

Excellent

Read Less

5- Certified Information System Security Professional (CI...

Muhammad Fahad

Very Interesting and Informative course

Very Interesting and Informative course

Read Less

6- Certified Information System Security Professional (CI...

Naeem ullah

explanation and the text of the course is fantastic and informative

explanation and the text of the course is fantastic and informative

Read Less

6- Certified Information System Security Professional (CI...

Naeem ullah

explanation and the text of the course is fantastic and informative

explanation and the text of the course is fantastic and informative

Read Less

7- Certified Information System Security Professional (CI...

SYED KHAJA NAJEEB AHMED

Excellent

Excellent

Read Less