Languages
Python
C/C++
PowerShell & Bash scripting
HTML, CSS & JS, PHP
MySQL, MongoDB
React
Kotlin
Libraries
NumPy, Pandas, Matplotlib,
Seaborn, Plotly
Scikit-learn, TensorFlow, Keras
NLTK
OpenCV, Pillow
Requests, Sockets, Pickle
Beautiful Soup,Tkinter, pycrypto
pygame, keyboard
sqllite, OS, subprocess
Frameworks
Flask & Django
Node.js, React, Express & Bootstrap
Heroku & Docker
Streamlit
Selenium
Scrapy
Postman
Cybersecurity Tools & Concepts
CCNA, Network security & Netflow
AES, PGP, OpenSSL, Let’s Encrypt
Wireshark, Nmap, Tcpdump, Snort, Burp Suite
Metasploit, John the Ripper, SQLMap, Hydra,
Nikto, Aircrack-ng
SSL/TLS, Intrusion Detection System,
Cryptography & Data security
Red Hat System Administration Course,
PowerShell, CLI (Command Line Interface), Kali Linux
Web Applications Security, Ethical Hacking,
Incident Response, Risk Assessment, Network Security & Firewalls
Other
Git & GitHub, Vmware
Database Management System
Cyber-Physical Systems
Data Analysis & Data Visualization, Time Series Analysis
Recommender Systems, Internet of Things (IoT), Computer
Vision
AWS IAM (Identity and Access Management) & AWS KMS (Key
Management Service)
Machine Learning, Deep Learning , Transfer Learning,
Reinforcement Learning, Generative Adversarial Networks (GANs), Neural Networks, Natural
Language Processing (NLP)
Cloud Services
AWS
Google Cloud
Docker