OSI & TCP/IP Models
IP Addressing & Subnetting
Firewalls & VPNs
Wireshark Analysis
Network Segmentation
SIEM & Splunk
Vulnerability Scanning
Endpoint Security
Identity Management
Log Analysis
MITRE ATT&CK Framework
Malware Analysis
Threat Actor Profiling
Phishing Detection
IOC Analysis
Incident Response Lifecycle
Digital Forensics
Evidence Collection
Threat Hunting
Containment Strategies
SOC Architecture
SOAR Platforms
Security Automation
Python for Security
Compliance & Governance