- Network Security
- Vulnerability Assessment and Management
- Incident Response and Remediation
- Penetration Testing
- Security Information and Event Management (SIEM)
- Identity and Access Management (IAM)
- Risk Assessment and Management
- Ethical Hacking
- Threat Response
- Computer Forensics
- Mimecast
- CrowdStrike
- Ivanti/MDM
- FortiGate
- Rapid7
- SIEM- LogRhythm
- SOC Trained
- Kali Linux/Metasploit
- Proof Point
- Palo Alto XDR
- Palo Alto XSOAR
- Microsoft Sentinel