Download as Excel Download as CSV

     - Required for role        - Nice to Have        - In an ideal world

  Penetration Tester - Core Skills - Web App Specialist - Infrastructure Specialist - Mobile App testing specialist - Mobile Device testing/MDM - IoT/Device Testing Specialist - Windows Hacking Specialist Security Researcher Red Team Member - Physical Access Specialist - Threat Simulation Specialist Compliiance Manager - GDPR Specialist - ISO27001 Specialist/Assessor - PCI DSS Specialist/QSA Incident Responder - Core Skills Threat Intelligence - Core Skills - SIEM Specialist - Malware Analyst - Theat Intel Data Scientist Firewall Engineer Security Architect - Windows Security Architect - Linux SOC monitoring analyst SOC content developer Security infrastructure engineer Network Security Architect User Awareness Trainer Developer Awareness Trainer
Reporting skills 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 2 2 1 1 2 2 2 2
Summary technical knowledge 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 2
Presentation Skills 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 2 2 2
Security-to-Business Integration 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 2 2 2 2
Training Materials 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 2 2
Networking Basics 2 2 2 2 2 2 2 2 2 2 2 0 0 0 0 0 2 2 2 0 2 2 2 2 2 2 2 0 1
Network protocol fundamentals 1 2 2 2 1 2 1 2 2 1 2 0 0 0 0 1 2 1 2 1 2 2 2 1 0 2 0 1 1
Web App Basics 2 2 2 2 2 2 2 2 2 2 2 0 0 0 0 0 2 1 2 0 2 0 0 2 2 1 1 0 1
Web Protocol Basics 1 2 1 2 1 2 1 1 1 1 2 0 0 0 0 0 2 1 2 0 2 1 1 1 2 1 1 0 1
Infrastructure Basics 2 1 2 2 1 2 2 2 2 2 2 0 0 0 0 0 2 0 2 0 2 2 2 1 1 2 2 0 1
WiFi hacking Basics 2 0 2 2 1 1 1 2 2 2 2 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 1
Radio Hacking 0 0 0 1 0 1 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
RFID hacking 0 0 1 0 0 0 0 0 2 2 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Android Hacking 1 1 0 2 2 2 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 1
Apple iOS Hacking 1 1 0 2 2 2 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 1
Exploit Development 1 2 2 1 0 2 1 2 1 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Tool Development 1 2 2 2 0 2 1 2 1 0 2 0 0 0 0 0 0 0 0 1 0 0 0 1 2 2 0 0 0
Social Engineering 0 0 0 0 0 0 0 0 2 2 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
Advanced Locksport 0 0 0 0 0 0 0 0 1 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
OSINT 0 0 0 0 0 0 0 0 2 2 2 0 0 0 0 0 1 0 2 1 0 0 0 1 1 0 0 0 0
Red Team Physical Access 0 0 0 0 0 0 0 0 2 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0
Windows Sandbox/Desktop Breakout 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 1 0 2 0 0 0 0 0 0 0 0 0 0
Linux Sandbox/Desktop breakout 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 1 0 2 0 0 0 0 0 0 0 0 0 0
GDPR Basics 1 1 1 1 1 1 0 1 1 1 1 1 0 0 0 0 1 0 1 1 1 1 1 0 0 1 1 0 0
ISO27001 Basics 0 1 1 1 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 1 1 0 0
PCI DSS Basics 1 1 1 1 1 1 0 1 1 1 1 1 0 0 0 0 1 0 1 0 1 1 1 0 0 1 1 0 0
Embedded System basics 0 0 0 1 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
IoT Fundamentals 0 0 0 0 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
GDPR 0 0 0 0 0 0 0 0 0 0 0 1 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
ISO27001 0 0 0 0 0 0 0 0 0 0 0 1 0 2 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
PCI DSS 0 0 0 0 0 0 0 0 0 0 0 1 0 0 2 0 0 0 0 0 0 0 0 0 0 0 1 0 0
Basic Dynamic Binary Analysis 1 0 1 1 0 2 1 2 1 0 1 0 0 0 0 1 2 0 2 0 0 1 1 1 0 0 0 0 0
Basics of Static Analysis 1 0 1 1 0 2 1 2 1 0 1 0 0 0 0 1 2 0 2 0 0 1 1 1 0 0 0 0 0
Binary Reverse Engineering - x86 1 0 1 0 0 1 1 2 0 0 2 0 0 0 0 1 2 0 2 0 0 1 1 0 0 0 0 0 0
Binary Reverse Engineering - ARM 0 0 0 2 0 2 0 2 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0
Binary Reverse Engineering 0 0 0 0 0 2 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
SIEM 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 2 1 2 1 1 1 2 2 2 0 0 0
SIEM configuration and content management 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 2 1 1 1 0 0 1 2 2 0 0 0
Principles of secure network design 1 1 2 1 0 1 2 1 0 0 1 0 0 0 0 0 0 1 0 0 2 2 2 0 1 2 2 0 0
Advanced Network Protocol Analysis 1 2 2 2 0 2 2 2 1 0 1 0 0 0 0 1 1 2 2 2 2 1 1 1 0 1 0 0 0
Advanced Windows Networking topics 1 0 2 0 0 0 2 0 1 0 1 0 0 0 0 1 1 0 1 0 1 2 0 0 0 1 1 0 0
Windows Secure Configuration 0 0 0 0 0 0 2 0 1 0 1 0 0 0 0 1 2 0 1 0 1 2 1 0 0 1 1 0 0
Linux Secure Configuration 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 1 2 0 0 0 1 1 2 0 0 1 1 0 0
Perimeter Security Device Configuration 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 1 1 0 0 0 2 0 0 0 0 2 1 0 0
Data Science and Advanced Data Analysis Techniques 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 1 2 0 0 0 1 1 1 0 0 0
Machine Learning 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 1 2 0 0 0 1 1 0 0 0 0
Intrusion detection principles 1 2 1 1 1 1 1 2 2 0 2 0 0 0 0 2 2 2 1 1 2 2 2 2 1 2 1 0 0
Advanced Intrusion Detection techniques 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 1 1 1 1 0 2 1 1 1 0 2 0 0 0