{"id":64,"date":"2023-08-17T08:23:39","date_gmt":"2023-08-17T07:23:39","guid":{"rendered":"https:\/\/fadiabdelrahim.com\/?page_id=64"},"modified":"2024-06-25T21:39:36","modified_gmt":"2024-06-25T20:39:36","slug":"skills","status":"publish","type":"page","link":"https:\/\/fadiabdelrahim.com\/index.php\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li>Network Security<\/li>\n\n\n\n<li>Vulnerability Assessment<\/li>\n\n\n\n<li>Monitoring and Detecting <\/li>\n\n\n\n<li>Incident Response<\/li>\n\n\n\n<li>Digital Forensics<\/li>\n\n\n\n<li>Penetrations Testing<\/li>\n\n\n\n<li>IT Risk Management<\/li>\n\n\n\n<li>Information Security<\/li>\n\n\n\n<li>Security Auditing<\/li>\n\n\n\n<li>Database Security<\/li>\n\n\n\n<li>SIEM<\/li>\n\n\n\n<li>Cybersecurity Policy Development<\/li>\n\n\n\n<li>Python<\/li>\n\n\n\n<li>Java<\/li>\n\n\n\n<li>C<\/li>\n\n\n\n<li>C++<\/li>\n\n\n\n<li>Active Directory<\/li>\n\n\n\n<li>Metasploit<\/li>\n\n\n\n<li>Shells and Privilege Escalation <\/li>\n\n\n\n<li>Nessus<\/li>\n\n\n\n<li>Splunk<\/li>\n\n\n\n<li>Mitre<\/li>\n\n\n\n<li>Nmap<\/li>\n\n\n\n<li>Powershell<\/li>\n\n\n\n<li>Network Services<\/li>\n\n\n\n<li>Network Explotiation<\/li>\n\n\n\n<li>Azure Firewall<\/li>\n\n\n\n<li>Network Security Group<\/li>\n\n\n\n<li>Azure Kubernetes Service<\/li>\n\n\n\n<li>Web Application Firewall<\/li>\n\n\n\n<li>Azure Key Vault<\/li>\n\n\n\n<li>Azure AD<\/li>\n\n\n\n<li>Role-Based Access Control (RBAC)<\/li>\n\n\n\n<li>Microsoft Defender for Colud<\/li>\n\n\n\n<li>Azure Monitor<\/li>\n\n\n\n<li>Storage Encryption<\/li>\n\n\n\n<li>Azure File Security<\/li>\n\n\n\n<li>Azure SQL Security<\/li>\n\n\n\n<li>Azure AD RBAC<\/li>\n\n\n\n<li>Multi-Factor Authentication <\/li>\n\n\n\n<li>Azure Active Directory Administrative Units<\/li>\n\n\n\n<li>Azure Active Directory Connect <\/li>\n\n\n\n<li>Azure Active Directory Domain Service<\/li>\n\n\n\n<li>Log Analytics Workspace<\/li>\n\n\n\n<li>Microsoft Defender for Servers<\/li>\n\n\n\n<li>Microsoft Sentinel<\/li>\n\n\n\n<li>Azure AD Identity Protection<\/li>\n\n\n\n<li>Azure Blueprint<\/li>\n\n\n\n<li>Azure AD Privileged Identity Management <\/li>\n\n\n\n<li>Data Management<\/li>\n\n\n\n<li>Cloud Architect <\/li>\n\n\n\n<li>Cloud Computing Security<\/li>\n\n\n\n<li>Network Monitoring <\/li>\n\n\n\n<li>System Testing<\/li>\n\n\n\n<li>Security Testing<\/li>\n\n\n\n<li>Information Security (INFOSEC)<\/li>\n\n\n\n<li>Threat Intelligence<\/li>\n\n\n\n<li>Security Analysis<\/li>\n\n\n\n<li>Regulatory Compliance<\/li>\n\n\n\n<li>Threat Mitigation <\/li>\n\n\n\n<li>Asset Management<\/li>\n\n\n\n<li>Access Control<\/li>\n\n\n\n<li>Encryption Techniques<\/li>\n\n\n\n<li>Access Management<\/li>\n\n\n\n<li>Identity Governace<\/li>\n\n\n\n<li>Enterprise Security<\/li>\n\n\n\n<li>Authentication Methods<\/li>\n\n\n\n<li>Event Management<\/li>\n\n\n\n<li>Data Structures<\/li>\n\n\n\n<li>Systems<\/li>\n\n\n\n<li>Information Security Management<\/li>\n\n\n\n<li>Object-Oriented Software Development<\/li>\n\n\n\n<li>Windows<\/li>\n\n\n\n<li>MacOs<\/li>\n\n\n\n<li>Linux<\/li>\n\n\n\n<li>Web Hacking<\/li>\n\n\n\n<li>Burp Suite<\/li>\n\n\n\n<li>OWASP<\/li>\n\n\n\n<li>Cryptography<\/li>\n\n\n\n<li>Hashing<\/li>\n\n\n\n<li>John The Ripper<\/li>\n\n\n\n<li>Encryption<\/li>\n\n\n\n<li>Windows Exploitation<\/li>\n\n\n\n<li>Windows Fundamentals<\/li>\n\n\n\n<li>Yara<\/li>\n\n\n\n<li>ISAC<\/li>\n\n\n\n<li>OpenVas<\/li>\n\n\n\n<li>Sysinternals<\/li>\n\n\n\n<li>Sysmon<\/li>\n\n\n\n<li>suricate<\/li>\n\n\n\n<li>Osquery<\/li>\n\n\n\n<li>Graylog<\/li>\n\n\n\n<li>OpenEDR<\/li>\n\n\n\n<li>Redline<\/li>\n\n\n\n<li>Autopsy<\/li>\n\n\n\n<li>DotPeek<\/li>\n\n\n\n<li>ILSpy<\/li>\n\n\n\n<li>Hydra<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-64","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/pages\/64"}],"collection":[{"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":7,"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/pages\/64\/revisions"}],"predecessor-version":[{"id":171,"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/pages\/64\/revisions\/171"}],"wp:attachment":[{"href":"https:\/\/fadiabdelrahim.com\/index.php\/wp-json\/wp\/v2\/media?parent=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}