What skills you will gain

  • Python Language
    • Linux Fundamental
      • CISSP Preparation
        • Cyber Security Essential
          • Cyber Security Standard
            • Industrial Cyber Security
              • Open Source Tools of Cyber Security
                • Various Types of Forensics
  • Data Science
    • Data Cleansing
      • Cluster Analysis
        • Machine Learning
          • Github
            • Data Analysis
              • Debugging
                • Data Manipulation
    • Exploratory Data Analysis
      • R studio
        • Regular Expression (REGEX)
  • Monitor activity and changes on a server with Linux Audit and AIDE.
    • Protect data from compromise with storage encryption.
      • Troubleshoot boot/ security/storage/network issues.
        • Create and manage highly available services.
  • Reading Skills
    • Writing Skills
      • Listening Skills
        • Speaking Skills
          • Exam Preparation and Support
            • Live Sessions
              • Assignment Feedback
  • Vulnerability Assessment
    • Web Application Pentesting
      • Network Pentesting
        • Bug Bounty Hunter
          • CIS Critical Control
            • PCI DSS
              • ISO 27001
                • Mobile Hacking
    • All things wireless
      • Advanced Web App pentesting
        • Exploit Development
          • Digital Forensics
            • HIPAA Labs
              • NIST Cyber Security Framework
                • IASME Governance Standard
                  • SOC 1, 2, 3 Type I and 2
    • HITRUST CSF
      • CISQ
        • FEDRAMP
          • GDPR
            • FISMA
              • NY DFS
                • FFIEC
                  • NERC CIP
  • How to optimize Linkedin profile
    • How to reach your audience effectively
      • How to become employable
        • How to boost your existing business
  • Develop mathematical model of linear systems
    • Solving system of linear equations and understanding its geometry
      • Geometry of linear equations
        • Application of mathematics to real world problems
          • Analytical and computation skills in the topics covered
            • Understand the mathematics and geometry of optimization

Course Content

  • Python Primer
    • Python Alpha
      • Python Beta
        • Python Gamma
          • Linux Primer
            • Linux Alpha
              • Linux Beta
                • CISSP Preparation
                  • ISO 27001, 27017, 27018 Lead Implementer
                    • Cyber Security Essentials Revisit
                      • SCADA, ISO 27019:2013 & NIST 800-82 Connection
                        • SCADA Security 101
    • SIEM a hands on approach
      • PCI DSS QSA Training
        • Vulnerability assessment in line with various frameworks
          • Web application Pentesting, & Ethical Hacking in line with various frameworks
            • Network Pentesting, & Ethical Hacking in line with various frameworks
              • Bug Bounty Hunting
                • ISO 2700x Standards review as per Digital Forensics
                  • Intro to Open Source tools in Forensics
                    • Network Threat Hunting
                      • Security Operations Center Role in Cyber Security
                        • Incident Response a Hands on approach
                          • Windows Forensics
    • Memory Forensics
      • Network Forensics
        • Threat Intelligence
          • Cell Phone Forensics
            • Malware Analysis and Reverse Engineering
  • Introduction of Data Science
    • R Programming
      • Data Collection and Data Wrangling
        • Exploratory Data Analysis
          • Machine Learning: Supervised Learning
            • Machine Learning: Unsupervised Learning
              • Capstone Project
                • Data Visualization
  • Linux Fundamentals
    • User & Network Administration
      • Server Apps
        • Core Admin
  • Vulnerability Assessment Labs
    • Web Application Pentesting Labs
      • Network Pentesting Labs
        • How to be a bug bounty hunter
          • CIS Critical Control Labs
            • PCI DSS Labs
              • ISO 27001 Labs
                • Mobile Hacking Labs
                  • GCP vs OVH vs Azure vs AWS Pentesting Labs
                    • All things wireless labs
                      • Advanced Web App pentesting labs
                        • Exploit Development Labs
    • HIPAA Labs
      • NIST Cyber Security Framework Labs
        • IASME Governance Standard Labs
          • SOC 1, 2, 3 Type I and 2 labs
            • TC Cyber Labs
              • HITRUST CSF
                • CISQ Labs
                  • FEDRAMP Labs
                    • GDPR Labs
                      • FISMA Labs
                        • NY DFS Labs
                          • FFIEC Labs
  • In my 4 Weeks LinkedIn Coaching focuses the following strategic areas.
    • Introduction to LinkedIn Opportunities
      • How LinkedIn helps job seekers, influencers and businesses
        • LinkedIn profile health check
          • How to Brand yourself on LinkedIn
            • Identifying Headline Keywords
              • Industry focus – How to target an industry
                • How to write a compelling and optimized LI Summary?
                  • Targeted Content Creation
                    • Building your personal Brand on LinkedIn
                      • Using Hashtags
                        • Relevant and Targeted Networking
    • Finding the hidden job markets
      • Bonus feature
        • Worksheets and Practical Assignments
  • Linear Algebra – Matrix theory and its real world applications
    • Probability – as a tool for decision making under uncertain circumstances
      • Statistics
        • Calculus and Optimization
  • Develop mathematical model of linear systems
    • Solving system of linear equations and understanding its geometry
      • Geometry of linear equations
        • Application of mathematics to real world problems
          • Analytical and computation skills in the topics covered
            • Understand the mathematics and geometry of optimization