Offensive
- Penetration Testing
- Manual & automated exploitation
- Vulnerability Assessment
- Red Team Assessments
- Command & Control (C2) Operations
- Evasion Techniques
- Reverse Engineering
- Vulnerability/Risk communication and reporting
Defensive
- Incident Handling
- SOC Operations
- Digital Forensics and Incident Response (DFIR) Operations
- Threat Hunting
- SIEM Operations & Tactical Analysis
- Log Analysis
- Active Directory Attack Analysis
- Network Traffic Analysis
- Reverse Engineering & Malware Analysis
Purple Team
- Adversary Emulation
- Detection Engineering
- Active Directory Attacks & Defense
- Threat Modeling
- Detection Gap Analysis
- Endpoint Telemetry
- Network Telemetry
- Purple Team Exercises
- Red–Blue Collaboration