- Required for role        - Nice to Have        - In an ideal world

  Penetration Tester - Core Skills
Reporting skills 2
Summary technical knowledge 2
Presentation Skills 0
Security-to-Business Integration 1
Training Materials 0
Networking Basics 2
Network protocol fundamentals 1
Web App Basics 2
Web Protocol Basics 1
Infrastructure Basics 2
WiFi hacking Basics 2
Radio Hacking 0
RFID hacking 0
Android Hacking 1
Apple iOS Hacking 1
Exploit Development 1
Tool Development 1
Social Engineering 0
Advanced Locksport 0
OSINT 0
Red Team Physical Access 0
Windows Sandbox/Desktop Breakout 0
Linux Sandbox/Desktop breakout 0
GDPR Basics 1
ISO27001 Basics 0
PCI DSS Basics 1
Embedded System basics 0
IoT Fundamentals 0
GDPR 0
ISO27001 0
PCI DSS 0
Basic Dynamic Binary Analysis 1
Basics of Static Analysis 1
Binary Reverse Engineering - x86 1
Binary Reverse Engineering - ARM 0
Binary Reverse Engineering 0
SIEM 0
SIEM configuration and content management 0
Principles of secure network design 1
Advanced Network Protocol Analysis 1
Advanced Windows Networking topics 1
Windows Secure Configuration 0
Linux Secure Configuration 0
Perimeter Security Device Configuration 0
Data Science and Advanced Data Analysis Techniques 0
Machine Learning 0
Intrusion detection principles 1
Advanced Intrusion Detection techniques 0
 
Reporting skills
Summary technical knowledge
Presentation Skills
Security-to-Business Integration
Training Materials
Networking Basics
Network protocol fundamentals
Web App Basics
Web Protocol Basics
Infrastructure Basics
WiFi hacking Basics
Radio Hacking
RFID hacking
Android Hacking
Apple iOS Hacking
Exploit Development
Tool Development
Social Engineering
Advanced Locksport
OSINT
Red Team Physical Access
Windows Sandbox/Desktop Breakout
Linux Sandbox/Desktop breakout
GDPR Basics
ISO27001 Basics
PCI DSS Basics
Embedded System basics
IoT Fundamentals
GDPR
ISO27001
PCI DSS
Basic Dynamic Binary Analysis
Basics of Static Analysis
Binary Reverse Engineering - x86
Binary Reverse Engineering - ARM
Binary Reverse Engineering
SIEM
SIEM configuration and content management
Principles of secure network design
Advanced Network Protocol Analysis
Advanced Windows Networking topics
Windows Secure Configuration
Linux Secure Configuration
Perimeter Security Device Configuration
Data Science and Advanced Data Analysis Techniques
Machine Learning
Intrusion detection principles
Advanced Intrusion Detection techniques
 
  Penetration Tester - Core Skills