What skills you will gain

  • Python Language
    • Linux Fundamental
      • CISSP Preparation
        • Cyber Security Essential
          • Cyber Security Standard
            • Industrial Cyber Security
              • Open Source Tools of Cyber Security
                • Various Types of Forensics
  • Data Science
    • Data Cleansing
      • Cluster Analysis
        • Machine Learning
          • Github
            • Data Analysis
              • Debugging
                • Data Manipulation
    • Exploratory Data Analysis
      • R studio
        • Regular Expression (REGEX)
  • Monitor activity and changes on a server with Linux Audit and AIDE.
    • Protect data from compromise with storage encryption.
      • Troubleshoot boot/ security/storage/network issues.
        • Create and manage highly available services.
  • Reading Skills
    • Writing Skills
      • Listening Skills
        • Speaking Skills
          • Exam Preparation and Support
            • Live Sessions
              • Assignment Feedback
  • Vulnerability Assessment
    • Web Application Pentesting
      • Network Pentesting
        • Bug Bounty Hunter
          • CIS Critical Control
            • PCI DSS
              • ISO 27001
                • Mobile Hacking
    • All things wireless
      • Advanced Web App pentesting
        • Exploit Development
          • Digital Forensics
            • HIPAA Labs
              • NIST Cyber Security Framework
                • IASME Governance Standard
                  • SOC 1, 2, 3 Type I and 2
    • HITRUST CSF
      • CISQ
        • FEDRAMP
          • GDPR
            • FISMA
              • NY DFS
                • FFIEC
                  • NERC CIP
  • How to optimize Linkedin profile
    • How to reach your audience effectively
      • How to become employable
        • How to boost your existing business
  • Develop mathematical model of linear systems
    • Solving system of linear equations and understanding its geometry
      • Geometry of linear equations
        • Application of mathematics to real world problems
          • Analytical and computation skills in the topics covered
            • Understand the mathematics and geometry of optimization
  • Ethereum Blockchain Network
    • The Rise of Decentralized Apps
      • Web3 Technologies (Setup DAPP Pre-requisites)
        • Backend Code Development
          • DAPP Frontend Development
            • Unit Testing of Smart Contract
              • Contract Best Practices
                • Security Patterns
    • The philosophy of Crypto Currencies
      • The Tokenomics : A Crypto Shift
        • Ethereum NFT and FT Tokens
          • Exchanges CEX/DEX and Liquidity pools
            • Token Development (ERC-20)
              • NFT Token Development (ERC-721)

Course Content

  • Python Primer
    • Python Alpha
      • Python Beta
        • Python Gamma
          • Linux Primer
            • Linux Alpha
              • Linux Beta
                • CISSP Preparation
                  • ISO 27001, 27017, 27018 Lead Implementer
                    • Cyber Security Essentials Revisit
                      • SCADA, ISO 27019:2013 & NIST 800-82 Connection
                        • SCADA Security 101
    • SIEM a hands on approach
      • PCI DSS QSA Training
        • Vulnerability assessment in line with various frameworks
          • Web application Pentesting, & Ethical Hacking in line with various frameworks
            • Network Pentesting, & Ethical Hacking in line with various frameworks
              • Bug Bounty Hunting
                • ISO 2700x Standards review as per Digital Forensics
                  • Intro to Open Source tools in Forensics
                    • Network Threat Hunting
                      • Security Operations Center Role in Cyber Security
                        • Incident Response a Hands on approach
                          • Windows Forensics
    • Memory Forensics
      • Network Forensics
        • Threat Intelligence
          • Cell Phone Forensics
            • Malware Analysis and Reverse Engineering
  • Introduction of Data Science
    • R Programming
      • Data Collection and Data Wrangling
        • Exploratory Data Analysis
          • Machine Learning: Supervised Learning
            • Machine Learning: Unsupervised Learning
              • Capstone Project
                • Data Visualization
  • Linux Fundamentals
    • User & Network Administration
      • Server Apps
        • Core Admin
  • Vulnerability Assessment Labs
    • Web Application Pentesting Labs
      • Network Pentesting Labs
        • How to be a bug bounty hunter
          • CIS Critical Control Labs
            • PCI DSS Labs
              • ISO 27001 Labs
                • Mobile Hacking Labs
                  • GCP vs OVH vs Azure vs AWS Pentesting Labs
                    • All things wireless labs
                      • Advanced Web App pentesting labs
                        • Exploit Development Labs
    • HIPAA Labs
      • NIST Cyber Security Framework Labs
        • IASME Governance Standard Labs
          • SOC 1, 2, 3 Type I and 2 labs
            • TC Cyber Labs
              • HITRUST CSF
                • CISQ Labs
                  • FEDRAMP Labs
                    • GDPR Labs
                      • FISMA Labs
                        • NY DFS Labs
                          • FFIEC Labs
  • In my 4 Weeks LinkedIn Coaching focuses the following strategic areas.
    • Introduction to LinkedIn Opportunities
      • How LinkedIn helps job seekers, influencers and businesses
        • LinkedIn profile health check
          • How to Brand yourself on LinkedIn
            • Identifying Headline Keywords
              • Industry focus – How to target an industry
                • How to write a compelling and optimized LI Summary?
                  • Targeted Content Creation
                    • Building your personal Brand on LinkedIn
                      • Using Hashtags
                        • Relevant and Targeted Networking
    • Finding the hidden job markets
      • Bonus feature
        • Worksheets and Practical Assignments
  • Linear Algebra – Matrix theory and its real world applications
    • Probability – as a tool for decision making under uncertain circumstances
      • Statistics
        • Calculus and Optimization
  • Introduction
    • Understanding Public Blockchain
      • Ethereum Blockchain Network
        • Ethereum Programming Platform
          • Setup Development Environment
            • Basics of Solidity Language
              • Compile and Deploy Your First Contract
                • Live Contract Exercises
  • Introduction
    • Centralized Apps and world
      • The Rise of Decentralized Apps
        • DAPP Use-Cases
          • Web3 Technologies (Setup DAPP Pre-requisites)
            • Introduction to Interplanetary File System
              • Backend Code Development
                • DAPP Frontend Development
                  • DAPP In Action
                    • Integrate IPFS in DAPP
                      • Final Thoughts and Github Code
  • Introduction
    • Understanding Public Blockchain Security
      • A bedtime story of Smart Contract ( DAO Hack )
        • Unit Testing of Smart Contract
          • Contract Best Practices
            • Security Patterns
              • Oracle (Service Providers)
                • Fallback and Received Solidity Functions
                  • Upgrade Patterns for Smart Contracts
                    • Final Thoughts on Role of Security
  • DEFI Course Introduction
    • The philosophy of Crypto Currencies
      • The Tokenomics : A Crypto Shift
        • Tokens, ICO and STOs
          • Ethereum NFT and FT Tokens
            • Exchanges CEX/DEX and Liquidity pools
              • Token Development (ERC-20)
                • NFT Token Development (ERC-721)
                  • DeFI Protocols and building blocks
                    • Token Projects and Governance

Pre-requisites for Subscribing to Advancement Track – Add on:

  1. Students who have already enrolled in Career Advancement Track
  2. Students who aren’t enrolled in career advancement track, and they still want to get enrolled in Add-on Track, must confirm that they have already studied following courses / topics:
    • a. Cyber Security (covered in Career Advancement Track and / or CODS Track)
    • b. Mathematics (covered in Mathematics for emerging pathways)
    • c. Data Science Concepts (covered in Data Science in R and Data Science in Python Tracks)
    • d. Linux Administration concepts (covered in RHEL Course)
  3. By accepting terms and conditions, you are confirming that you have taken responsibility to cover all topics / concepts (in case you’re not enrolled in Career Advancement Track) taught in Career Advancement Track.


Accept the terms and conditions to buy add-on.