- Required for role - Nice to Have - In an ideal world
|
Reporting skills |
Summary technical knowledge |
Presentation Skills |
Security-to-Business Integration |
Training Materials |
Networking Basics |
Network protocol fundamentals |
Web App Basics |
Web Protocol Basics |
Infrastructure Basics |
WiFi hacking Basics |
Radio Hacking |
RFID hacking |
Android Hacking |
Apple iOS Hacking |
Exploit Development |
Tool Development |
Social Engineering |
Advanced Locksport |
OSINT |
Red Team Physical Access |
Windows Sandbox/Desktop Breakout |
Linux Sandbox/Desktop breakout |
GDPR Basics |
ISO27001 Basics |
PCI DSS Basics |
Embedded System basics |
IoT Fundamentals |
GDPR |
ISO27001 |
PCI DSS |
Basic Dynamic Binary Analysis |
Basics of Static Analysis |
Binary Reverse Engineering - x86 |
Binary Reverse Engineering - ARM |
Binary Reverse Engineering |
SIEM |
SIEM configuration and content management |
Principles of secure network design |
Advanced Network Protocol Analysis |
Advanced Windows Networking topics |
Windows Secure Configuration |
Linux Secure Configuration |
Perimeter Security Device Configuration |
Data Science and Advanced Data Analysis Techniques |
Machine Learning |
Intrusion detection principles |
Advanced Intrusion Detection techniques |
- Malware Analyst |
2 |
2 |
0 |
2 |
0 |
2 |
2 |
2 |
2 |
2 |
0 |
0 |
0 |
1 |
1 |
0 |
0 |
0 |
0 |
2 |
0 |
2 |
2 |
1 |
0 |
1 |
0 |
0 |
0 |
0 |
0 |
2 |
2 |
2 |
1 |
0 |
1 |
1 |
0 |
2 |
1 |
1 |
0 |
0 |
1 |
1 |
1 |
1 |
|
Reporting skills |
Summary technical knowledge |
Presentation Skills |
Security-to-Business Integration |
Training Materials |
Networking Basics |
Network protocol fundamentals |
Web App Basics |
Web Protocol Basics |
Infrastructure Basics |
WiFi hacking Basics |
Radio Hacking |
RFID hacking |
Android Hacking |
Apple iOS Hacking |
Exploit Development |
Tool Development |
Social Engineering |
Advanced Locksport |
OSINT |
Red Team Physical Access |
Windows Sandbox/Desktop Breakout |
Linux Sandbox/Desktop breakout |
GDPR Basics |
ISO27001 Basics |
PCI DSS Basics |
Embedded System basics |
IoT Fundamentals |
GDPR |
ISO27001 |
PCI DSS |
Basic Dynamic Binary Analysis |
Basics of Static Analysis |
Binary Reverse Engineering - x86 |
Binary Reverse Engineering - ARM |
Binary Reverse Engineering |
SIEM |
SIEM configuration and content management |
Principles of secure network design |
Advanced Network Protocol Analysis |
Advanced Windows Networking topics |
Windows Secure Configuration |
Linux Secure Configuration |
Perimeter Security Device Configuration |
Data Science and Advanced Data Analysis Techniques |
Machine Learning |
Intrusion detection principles |
Advanced Intrusion Detection techniques |