- Required for role        - Nice to Have        - In an ideal world

  Reporting skills Summary technical knowledge Presentation Skills Security-to-Business Integration Training Materials Networking Basics Network protocol fundamentals Web App Basics Web Protocol Basics Infrastructure Basics WiFi hacking Basics Radio Hacking RFID hacking Android Hacking Apple iOS Hacking Exploit Development Tool Development Social Engineering Advanced Locksport OSINT Red Team Physical Access Windows Sandbox/Desktop Breakout Linux Sandbox/Desktop breakout GDPR Basics ISO27001 Basics PCI DSS Basics Embedded System basics IoT Fundamentals GDPR ISO27001 PCI DSS Basic Dynamic Binary Analysis Basics of Static Analysis Binary Reverse Engineering - x86 Binary Reverse Engineering - ARM Binary Reverse Engineering SIEM SIEM configuration and content management Principles of secure network design Advanced Network Protocol Analysis Advanced Windows Networking topics Windows Secure Configuration Linux Secure Configuration Perimeter Security Device Configuration Data Science and Advanced Data Analysis Techniques Machine Learning Intrusion detection principles Advanced Intrusion Detection techniques
- IoT/Device Testing Specialist 2 2 0 2 0 2 2 2 2 2 1 1 0 2 2 2 2 0 0 0 0 0 0 1 1 1 2 2 0 0 0 2 2 1 2 2 0 0 1 2 0 0 0 0 0 0 1 0