• Linux/Unix Shell, System Administrator, VMware, VirtualBox, Python, Kali, SIFT, DEFT, Remnux, FTK Imager, Autopsy, Sleuthkit, Cellebrite, Xray, Wireshark, IDA Pro, JTR, Passware, Genymotion, Recovery
• Forensic Investigation: Server, Notebook, Mobile Phone, Network, Memory, Malware, Web Application, Bitcoin
• Data Science: Crawling (Web, Social Media), Prediction, Social Network Analysis, Big Data, Python Jupyter Notebook, Graph
• Cyber Security Management: Chief Information Officer, Enterprise Architecture, Business Intelligence, Strategic Plan, Risk Assessment, Legal, Job Competency Standard, Workforce Development, NIST Framework, Microsoft Office