Enumeration,footprinting,Penetration tester, password cracking, Evading IDS,Firewalls and Honeypots ,reverse engineering, information gathering,cloud computing, cryptography,mobile security framework assessment, vulnerability analysis, forensics, social engineering, password attacks, wireless attacks, exploitation