- Required for role - Nice to Have - In an ideal world
Reporting skills | Summary technical knowledge | Presentation Skills | Security-to-Business Integration | Training Materials | Networking Basics | Network protocol fundamentals | Web App Basics | Web Protocol Basics | Infrastructure Basics | WiFi hacking Basics | Radio Hacking | RFID hacking | Android Hacking | Apple iOS Hacking | Exploit Development | Tool Development | Social Engineering | Advanced Locksport | OSINT | Red Team Physical Access | Windows Sandbox/Desktop Breakout | Linux Sandbox/Desktop breakout | GDPR Basics | ISO27001 Basics | PCI DSS Basics | Embedded System basics | IoT Fundamentals | GDPR | ISO27001 | PCI DSS | Basic Dynamic Binary Analysis | Basics of Static Analysis | Binary Reverse Engineering - x86 | Binary Reverse Engineering - ARM | Binary Reverse Engineering | SIEM | SIEM configuration and content management | Principles of secure network design | Advanced Network Protocol Analysis | Advanced Windows Networking topics | Windows Secure Configuration | Linux Secure Configuration | Perimeter Security Device Configuration | Data Science and Advanced Data Analysis Techniques | Machine Learning | Intrusion detection principles | Advanced Intrusion Detection techniques | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Security Architect - Linux | 2 | 2 | 0 | 2 | 0 | 2 | 2 | 0 | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 1 | 0 | 2 | 1 | 0 | 1 | 2 | 0 | 0 | 0 | 2 | 1 |