RED HAT
Linux
✔ Red Hat Linux Essentials (RH033)
✔ Red Hat Linux Networking and Security Administration (RH253)
✔ Red Hat Linux System Administration (RH133)
COMPTIA
Security+ (SY0-501)
✔ Advanced Exploitation Techniques
✔ Authentication Systems
✔ Buffer Overflows
✔ Business Continuity
✔ Covering Tracks
✔ Cross-Site Scripting
✔ Cryptography
✔ Cryptography Weaknesses
✔ Denial of Service
✔ Evading Firewalls and Honeypots
✔ Evading IDS
✔ Hacking Web and App Servers
✔ Hacking Wireless Networks
✔ Introduction to Ethical Hacking
✔ Mobile Hacking Basics
✔ Network Design and Security Controls
✔ Penetration Testing
✔ Physical Security
✔ Port Scanning
✔ Scanning Networks
✔ Security Incidents
✔ Session Hijacking
✔ Sniffers
✔ Social Engineering
✔ Spyware & Keyloggers
✔ SQL Injections
✔ System Hacking
✔ Trojans and Backdoors
✔ Viruses and Worms
✔ Vulnerability Assessment
✔ Wireless Types and Vulnerabilities
MICROSOFT
MTA .NET Fundamentals (98-372)
✔ Introduction, Classes, Inheritance, Casting, Generics, Interfaces and Class Libraries
✔ Global Assembly Cache, Files, Values and Reference Types, Boxing and Unboxing, Application Settings and Handling Events
✔ XML Structure, Security, Common Language Runtime and Exam Review
ADOBE
Illustrator CS6
✔ What's Inside
✔ Painting and Drawing Tools
✔ Enhancing Your Artwork