- Vulnerability Response & Management
- Risk management and attack surface analysis
- Patch management and host protections
- Security controls and configuration management
- Threat Intelligence & Hunting
- OSINT and adversary tactics
- Threat actor identification
- Indicators of compromise (IoCs) analysis
- Security Architecture & Tools
- Network design and hardening
- Identity & Access Management (IAM)
- Data Loss Prevention (DLP), Public Key Infrastructure (PKI)
- Vulnerability Assessment
- Scanning and enumeration techniques
- Vulnerability lifecycle management
- Intrusion Detection/Prevention Systems (IDS/IPS)
- Wireless and cloud security
- Denial-of-Service (DoS) attack mitigation
- Host-Based Attacks & Defenses
- Malware analysis
- Endpoint security and privilege escalation
- Secure coding basics and social engineering
- Security Operations & Automation
- SIEM/SOAR operations
- Endpoint Detection and Response (EDR)
- Anomaly detection and workflow automation
- Incident Response & Recovery
- Incident lifecycle management
- Digital forensics and evidence handling
- Disaster recovery and business continuity planning