top of page

Below are some of the tools (Not All) and Operating Systems that we worked with in both Network Security and Technology Forensics. Each of these tools and many more are key to being an effective Penetration Tester, Forensic Investigator and Network Security Analyst.
Welcome to my UAT Portfolio
bottom of page