Kali Linux tools
Scanning and analysing for system vulnerabilities
Knowledge of DDos-attacks, phishing, brute force
Penetration testing (web, network, wireless)
Conducted SQL, HTML-injections
Knowledge of virology of virus classification (Warrior + Cryptor + Joiner practical application)
CISCO hardware settings
Worked with Metasploit Framework, n-map, Sqlmap, Wireshark
Social engineering
Research and exploitation of web vulnerabilities
CCNA Routing & Switching course