"","Penetration Tester - Core Skills","- Web App Specialist","- Infrastructure Specialist","- Mobile App testing specialist","- Mobile Device testing/MDM","- IoT/Device Testing Specialist","- Windows Hacking Specialist","Security Researcher","Red Team Member","- Physical Access Specialist","- Threat Simulation Specialist","Compliiance Manager","- GDPR Specialist","- ISO27001 Specialist/Assessor","- PCI DSS Specialist/QSA","Incident Responder - Core Skills","Threat Intelligence - Core Skills","- SIEM Specialist","- Malware Analyst","- Theat Intel Data Scientist","Firewall Engineer","Security Architect - Windows","Security Architect - Linux","SOC monitoring analyst","SOC content developer","Security infrastructure engineer","Network Security Architect","User Awareness Trainer","Developer Awareness Trainer" "Reporting skills","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","1","2","2","1","1","2","2","2","2" "Summary technical knowledge","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","1","2" "Presentation Skills","0","0","0","0","0","0","0","1","0","0","0","0","0","0","0","0","1","0","0","1","0","0","0","0","0","0","2","2","2" "Security-to-Business Integration","1","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","2","1","2","2","2","2" "Training Materials","0","0","0","0","0","0","0","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","1","2","2" "Networking Basics","2","2","2","2","2","2","2","2","2","2","2","0","0","0","0","0","2","2","2","0","2","2","2","2","2","2","2","0","1" "Network protocol fundamentals","1","2","2","2","1","2","1","2","2","1","2","0","0","0","0","1","2","1","2","1","2","2","2","1","0","2","0","1","1" "Web App Basics","2","2","2","2","2","2","2","2","2","2","2","0","0","0","0","0","2","1","2","0","2","0","0","2","2","1","1","0","1" "Web Protocol Basics","1","2","1","2","1","2","1","1","1","1","2","0","0","0","0","0","2","1","2","0","2","1","1","1","2","1","1","0","1" "Infrastructure Basics","2","1","2","2","1","2","2","2","2","2","2","0","0","0","0","0","2","0","2","0","2","2","2","1","1","2","2","0","1" "WiFi hacking Basics","2","0","2","2","1","1","1","2","2","2","2","0","0","0","0","0","1","0","0","0","0","0","0","0","0","0","1","0","1" "Radio Hacking","0","0","0","1","0","1","0","1","1","0","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "RFID hacking","0","0","1","0","0","0","0","0","2","2","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "Android Hacking","1","1","0","2","2","2","0","1","1","0","1","0","0","0","0","0","1","0","1","0","0","0","0","0","0","0","0","0","1" "Apple iOS Hacking","1","1","0","2","2","2","0","1","1","0","1","0","0","0","0","0","1","0","1","0","0","0","0","0","0","0","0","0","1" "Exploit Development","1","2","2","1","0","2","1","2","1","0","2","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "Tool Development","1","2","2","2","0","2","1","2","1","0","2","0","0","0","0","0","0","0","0","1","0","0","0","1","2","2","0","0","0" "Social Engineering","0","0","0","0","0","0","0","0","2","2","1","0","0","0","0","0","1","0","0","0","0","0","0","0","0","0","0","0","0" "Advanced Locksport","0","0","0","0","0","0","0","0","1","2","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "OSINT","0","0","0","0","0","0","0","0","2","2","2","0","0","0","0","0","1","0","2","1","0","0","0","1","1","0","0","0","0" "Red Team Physical Access","0","0","0","0","0","0","0","0","2","2","2","0","0","0","0","0","0","0","0","0","0","0","0","0","0","1","0","0","0" "Windows Sandbox/Desktop Breakout","0","0","0","0","0","0","0","0","1","1","1","0","0","0","0","0","1","0","2","0","0","0","0","0","0","0","0","0","0" "Linux Sandbox/Desktop breakout","0","0","0","0","0","0","0","0","1","1","1","0","0","0","0","0","1","0","2","0","0","0","0","0","0","0","0","0","0" "GDPR Basics","1","1","1","1","1","1","0","1","1","1","1","1","0","0","0","0","1","0","1","1","1","1","1","0","0","1","1","0","0" "ISO27001 Basics","0","1","1","1","1","1","0","0","0","0","0","1","0","0","0","0","0","0","0","0","0","1","1","0","0","1","1","0","0" "PCI DSS Basics","1","1","1","1","1","1","0","1","1","1","1","1","0","0","0","0","1","0","1","0","1","1","1","0","0","1","1","0","0" "Embedded System basics","0","0","0","1","0","2","0","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "IoT Fundamentals","0","0","0","0","0","2","0","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","1" "GDPR","0","0","0","0","0","0","0","0","0","0","0","1","2","0","0","0","0","0","0","0","0","0","0","0","0","0","1","0","0" "ISO27001","0","0","0","0","0","0","0","0","0","0","0","1","0","2","0","0","0","0","0","0","0","0","0","0","0","0","1","0","0" "PCI DSS","0","0","0","0","0","0","0","0","0","0","0","1","0","0","2","0","0","0","0","0","0","0","0","0","0","0","1","0","0" "Basic Dynamic Binary Analysis","1","0","1","1","0","2","1","2","1","0","1","0","0","0","0","1","2","0","2","0","0","1","1","1","0","0","0","0","0" "Basics of Static Analysis","1","0","1","1","0","2","1","2","1","0","1","0","0","0","0","1","2","0","2","0","0","1","1","1","0","0","0","0","0" "Binary Reverse Engineering - x86","1","0","1","0","0","1","1","2","0","0","2","0","0","0","0","1","2","0","2","0","0","1","1","0","0","0","0","0","0" "Binary Reverse Engineering - ARM","0","0","0","2","0","2","0","2","0","0","1","0","0","0","0","0","1","0","1","0","0","0","0","0","0","0","0","0","0" "Binary Reverse Engineering","0","0","0","0","0","2","0","1","0","0","1","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0" "SIEM","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","2","2","2","1","2","1","1","1","2","2","2","0","0","0" "SIEM configuration and content management","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","1","1","2","1","1","1","0","0","1","2","2","0","0","0" "Principles of secure network design","1","1","2","1","0","1","2","1","0","0","1","0","0","0","0","0","0","1","0","0","2","2","2","0","1","2","2","0","0" "Advanced Network Protocol Analysis","1","2","2","2","0","2","2","2","1","0","1","0","0","0","0","1","1","2","2","2","2","1","1","1","0","1","0","0","0" "Advanced Windows Networking topics","1","0","2","0","0","0","2","0","1","0","1","0","0","0","0","1","1","0","1","0","1","2","0","0","0","1","1","0","0" "Windows Secure Configuration","0","0","0","0","0","0","2","0","1","0","1","0","0","0","0","1","2","0","1","0","1","2","1","0","0","1","1","0","0" "Linux Secure Configuration","0","0","0","0","0","0","1","0","1","0","1","0","0","0","0","1","2","0","0","0","1","1","2","0","0","1","1","0","0" "Perimeter Security Device Configuration","0","0","0","0","0","0","0","0","1","0","1","0","0","0","0","1","1","0","0","0","2","0","0","0","0","2","1","0","0" "Data Science and Advanced Data Analysis Techniques","0","0","0","0","0","0","0","1","0","0","0","0","0","0","0","0","1","1","1","2","0","0","0","1","1","1","0","0","0" "Machine Learning","0","0","0","0","0","0","0","1","0","0","0","0","0","0","0","0","1","1","1","2","0","0","0","1","1","0","0","0","0" "Intrusion detection principles","1","2","1","1","1","1","1","2","2","0","2","0","0","0","0","2","2","2","1","1","2","2","2","2","1","2","1","0","0" "Advanced Intrusion Detection techniques","0","0","0","0","0","0","0","1","1","0","1","0","0","0","0","1","1","1","1","0","2","1","1","1","0","2","0","0","0"