User
Linux
Windows
Networking
Computers
Soft Skills
OSI Model
TCP/IP
Protocols
Routing
Subnetting
Wireless
Network Appliances
Proxy
Firewalls
VPN
Load Balancers
IDS/IPS
SMTP
DHCP
DNS
CIDR Notation
Packet Capture/PCAP
Office
Regex
Sharepoint
Excel
Word
Powerpoint
Visio
Outlook
Google Searches/Dorks
websites
shodan
censys.io
whois #
Sed
AWK
Logs
Parsing Logs
Ticketing Systems
Documentation
Communication
Phone
Team
Escalation Procedures
Reports
Task Prioritization
Analyst 1
Windows authentication
powershell
PE files
Internals
Logs #
Post Explotation
Permission Architecture
ELF Files
Logs #
Shell
Internals
Containers/Name Spaces
SIEM
Scripting
Programming
Splunk
ELK
Qradar
LogRhythm
python
powershell #
bash #
PHP
JavaScript
VBScript #
Assembly
C
C++
C#
ASP.NET
Java
Program Theory #
Flow Analysis #
PCAP #
Reverse Engineering
Encodings
base64
Encryption
Rot13
Threat Intel
Threat Hunting
machine learning
statistical analysis
Malware Analysis
Dynamic Analysis #
Static Analysis #
Offensive Security
Exploit Development #
Scanning
Vulnerability Assessment #
Recon
Exploitation
Persistence
Post Exploitation
Social Enginering #
Note Taking #
searches
Dashboards
Incident Review
Advance XML
tokens and inputs
saved searche
Scheduled Searches
Risk Framework
Deployment
lookups
Macros
Field Extractoins
Data Models
Extreme Search
Threat Feeds
Universal Forwarder Confs
Heavy Forwarder
Indexers
Search Heads
Deployment Servers
Application Development #
Logic
discrete math
Defense Theory
Risk mitigation
Defense indepth
Active Defense
Incident Response
Compliance
Change Control
Access Controls
Tools
nmap
shodan
censys.io
recon-ng
Maltego
Nessus
openVAS
Nexpose
Tools
Metasploit
SET
Cobolt Strike
Core Impact
sqlninja
nikto2
Wapiti
BurpSuite
ZAP
BBQsql
w3af
BeEF
Advance Metasploit #
Reporting
Tools
Standards
Dradis
Mimikatz
exfiltration
Meme