Skills
Ethical Hacking
Information Gathering
Vulnerability Analysis
Web Application Analysis Database Assesment
Password Attacks Wireless Attacks
Reverse Engineering Exploitation
Sniffing & Spoofing Post Exploitation
Forensics
Linux
Docker
Serverless framework
nmtcli nmtui
Linux
AWS Google Cloud
Cloudflare
Gitlab-CI Github Actions
Open-source projects
Softwares
Maltego
Metasploit
Burpsuite Sparta
Nessus
OpenVAS(GVM) Wireshark
HAProxy
Ngnix Apache
Operating Systems and Virtualization
Kali Linux
Ubuntu
RedHat CentOS
Setting up new user accounts and profiles
Dealing with password issues VMWARE, VirtualBox
Basic understanding of Windows Server USB and Network Printer installing
Hardware and Software installation and troubleshooting Backup creation
HDD RAID
Network
Subnetting
TCP/IP
VPN Docker Networking
Lan/Wan technologies
Router, Access Point configuration