- Cryptography:
- DES, AES, RSA
- Network Security:
- IDS/IPS Implementations
- NSM and Proxy Server Configurations
- Routing and Switching Protocols
- SIEM and SOAR Management
- Threat Modeling
- Cloud-based Security Monitoring
- Web Application Security:
- Penetration Testing
- Zed Attack Proxy
- OWASP Top 10 Vulnerabilities
- Security Operations:
- Log Analysis with Zeek
- Incident Response Frameworks (NIST Cybersecurity)
- Compliance Knowledge - PCI/SOX, HIPAA, GDPR
- Physical Security Monitoring and Access Control Systems
- Enterprise Security Solutions (Cameras, Access Control)
- Offensive Security:
- OSINT
- Metadata Analysis
- Reverse Engineering (x86 Assembly)
- Automation and Virtualization:
- Docker
- Vagrant
- Ansible
- VMware Workstation
- Security Awareness and Training:
- KnowBe4
- Demisto
- Networking:
- Arista EOS
- Cisco IOS
- Databases:
- MySQL
- Microsoft SQL Server
- Cloud Databases for Integrated Security Systems
- Hardware Security:
- Physical Security Solutions (Cameras, Access Control, Sensors)
- Hybrid-cloud Managed Devices and System Deployment
Programming Languages:
-
ASSEMBLY x86
-
BASH
-
BATCH
-
C++
-
JAVA
-
JAVASCRIPT
-
PHP
-
POWERSHELL
-
PYTHON
-
Q#
-
SQL
Development Tools and Environments:
-
ANDROID STUDIO
-
GIT
-
JUPYTER
-
MICROSOFT OFFICE
-
SQL
-
VISUAL STUDIO
-
ACTIVE DIRECTORY
Languages: