- Python programming
- Wireshark
- Network monitoring
- Data analysis
- Network protocols
- TCP/IP
- HTTP
- Network technologies
- Managing networks
- Network topologies
- Monitoring networks
- Network admin tools
- Network security devices
- Firewalls
- Threat mitigation
- Burp Suite
- Metasploit
- Kali Linux
- Vulnerability scanners
- Risk analysis
- Preventative measures
- Network security
- Compliance
- Operational security
- Access control
- Identity management
- Cryptography
- Data and host security
- Defining security policies
- Deploying security policies
- Performing and analyzing risk analysis
- Risk management
- Asset security
- Access management
- Security operations
- Security auditing