What skills you will gain

  • Python Language
  • Linux Fundamental
  • CISSP Preparation
  • Cyber Security Essential
  • Cyber Security Standard
  • Industrial Cyber Security
  • Open Source Tools of Cyber Security
  • Various Types of Forensics
  • Bug Bounty Essentials
  • Data Science
  • Data Cleansing
  • Cluster Analysis
  • Machine Learning
  • Github
  • Data Analysis
  • Debugging
  • Data Manipulation
  • R Programming
  • Exploratory Data Analysis
  • R studio
  • Regular Expression (REGEX)
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with storage encryption.
  • Troubleshoot boot/ security/storage/network issues.
  • Create and manage highly available services.
  • Reading Skills
  • Writing Skills
  • Listening Skills
  • Speaking Skills
  • Exam Preparation and Support
  • Live Sessions
  • Assignment Feedback
  • Vulnerability Assessment
  • Web Application Pentesting
  • Network Pentesting
  • Bug Bounty Hunter
  • CIS Critical Control
  • PCI DSS
  • ISO 27001
  • Mobile Hacking
  • GCP vs OVH vs Azure vs AWS Pentesting
  • All things wireless
  • Advanced Web App pentesting
  • Exploit Development
  • Digital Forensics
  • HIPAA Labs
  • NIST Cyber Security Framework
  • IASME Governance Standard
  • SOC 1, 2, 3 Type I and 2
  • TC Cyber
  • HITRUST CSF
  • CISQ
  • FEDRAMP
  • GDPR
  • FISMA
  • NY DFS
  • FFIEC
  • NERC CIP
  • How to optimize Linkedin profile
  • How to reach your audience effectively
  • How to become employable
  • How to boost your existing business
  • Develop mathematical model of linear systems
  • Solving system of linear equations and understanding its geometry
  • Geometry of linear equations
  • Application of mathematics to real world problems
  • Analytical and computation skills in the topics covered
  • Understand the mathematics and geometry of optimization

Course Content

  • Python Primer
  • Python Alpha
  • Python Beta
  • Python Gamma
  • Linux Primer
  • Linux Alpha
  • Linux Beta
  • CISSP Preparation
  • ISO 27001, 27017, 27018 Lead Implementer
  • Cyber Security Essentials Revisit
  • SCADA, ISO 27019:2013 & NIST 800-82 Connection
  • SCADA Security 101
  • SCADA Prevention and Detection a Hands on approach
  • SIEM a hands on approach
  • PCI DSS QSA Training
  • Vulnerability assessment in line with various frameworks
  • Web application Pentesting, & Ethical Hacking in line with various frameworks
  • Network Pentesting, & Ethical Hacking in line with various frameworks
  • Bug Bounty Hunting
  • ISO 2700x Standards review as per Digital Forensics
  • Intro to Open Source tools in Forensics
  • Network Threat Hunting
  • Security Operations Center Role in Cyber Security
  • Incident Response a Hands on approach
  • Windows Forensics
  • iOS forensics Analysis and IRM
  • Memory Forensics
  • Network Forensics
  • Threat Intelligence
  • Cell Phone Forensics
  • Malware Analysis and Reverse Engineering
  • Introduction of Data Science
  • R Programming
  • Data Collection and Data Wrangling
  • Exploratory Data Analysis
  • Machine Learning: Supervised Learning
  • Machine Learning: Unsupervised Learning
  • Capstone Project
  • Data Visualization
  • Linux Fundamentals
  • User & Network Administration
  • Server Apps
  • Core Admin
  • Vulnerability Assessment Labs
  • Web Application Pentesting Labs
  • Network Pentesting Labs
  • How to be a bug bounty hunter
  • CIS Critical Control Labs
  • PCI DSS Labs
  • ISO 27001 Labs
  • Mobile Hacking Labs
  • GCP vs OVH vs Azure vs AWS Pentesting Labs
  • All things wireless labs
  • Advanced Web App pentesting labs
  • Exploit Development Labs
  • Digital Forensics Labs
  • HIPAA Labs
  • NIST Cyber Security Framework Labs
  • IASME Governance Standard Labs
  • SOC 1, 2, 3 Type I and 2 labs
  • TC Cyber Labs
  • HITRUST CSF
  • CISQ Labs
  • FEDRAMP Labs
  • GDPR Labs
  • FISMA Labs
  • NY DFS Labs
  • FFIEC Labs
  • NERC CIP Labs
  • In my 4 Weeks LinkedIn Coaching focuses the following strategic areas.
  • Introduction to LinkedIn Opportunities
  • How LinkedIn helps job seekers, influencers and businesses
  • LinkedIn profile health check
  • How to Brand yourself on LinkedIn
  • Identifying Headline Keywords
  • Industry focus – How to target an industry
  • How to write a compelling and optimized LI Summary?
  • Targeted Content Creation
  • Building your personal Brand on LinkedIn
  • Using Hashtags
  • Relevant and Targeted Networking
  • Connecting with recruiters and influencers
  • Finding the hidden job markets
  • Bonus feature
  • Worksheets and Practical Assignments
  • Linear Algebra – Matrix theory and its real world applications
  • Probability – as a tool for decision making under uncertain circumstances
  • Statistics
  • Calculus and Optimization