the TCP/IP stack ● Solid understanding of the OSI model and renowned ports and services ● Understanding measures for the protection of the organization's data, systems, and networks ● Create and maintain documentation security breaches ● Ensuring that the organization's data and infrastructure are protected by enabling the that the organization's infrastructure and existing data are kept safe ● Conducting testing and scans to