Skills
Ethical Hacking
Information gathering
Vulnerability analysis
Web security analysis Database security
Password attacks Wireless attacks
Reverse Engineering Infiltration
Sniffing & Spoofing Post Exploitation
Forensics
Linux
Docker
Serverless framework
nmtcli nmtui
Linux
AWS Google Cloud
Cloudflare
Gitlab-CI Github Actions
Open-source projects
Software
Maltego
Metasploit
Burpsuite Sparta
Nessus
OpenVAS(GVM) Wireshark
HAProxy
Ngnix Apache
Operating Systems and Virtualization
Kali Linux
Ubuntu
RedHat CentOS
Creating new users and accounts
Dealing with password issues VMWARE, VirtualBox
Windows Server knowledge USB and Network Printer installation
Hardware and Software installation Creating backups
HDD RAID
Networking
Subnet
TCP/IP
VPN Docker Networking
LAN/WAN technologies
Router, Access Point configuration