
1. 1.Programming Languages
1.1. C / C++
1.2. Java
1.3. Python
1.4. Node
1.5. Ruby
2. 2.Tools
2.1. Power Shell
2.2. OpenSSH
3. 4.Cybersecurity Concepts
3.1. Firewalls | Network Architecture
3.2. TCP/IP | OSI Model
3.3. Penetration Testing
3.4. Vulnerability Assessment
3.5. Intrusion Detection
3.6. Computer Forensics
3.7. SIEM Management
4. 3.Operating System
4.1. Linux
4.2. UNIX
4.3. Windows
5. 5.Certifications
5.1. CompTIA Certifications
5.1.1. A+
5.1.2. Network+
5.1.3. Security+
5.1.4. Linux+
5.1.5. CASP + : CompTIA Advanced Security Practitioner
5.1.6. CySa+ : CompTIA Cybersecurity Analyst
5.2. EC Council Certifications
5.2.1. CEH: Certified Ethical Hacker
5.2.2. CHFI: Computer Hacking Forensics Investigator
5.2.3. ECSA: EC-Council Certified Security Analyst
5.2.4. LPT: Licensed Penetration Tester
5.3. ISACA Certifications
5.3.1. CISM: Certified Information Systems Manager
5.3.2. CISA: Certified Information Systems Auditor Cisco Certifications
5.3.3. CCNA Routing & Switching: Cisco Certified Network Associate
5.3.4. CCNA Security: Cisco Certified Network Associate
5.4. ISC2 Certifications
5.4.1. CISSP: Certified Information Systems Security Professional
5.4.2. SSCP: Systems Security Certified Practitioner
5.4.3. CCSP: Certified Cloud Security Professional
5.4.4. CAP: Certified Authorization Professional