C, C++, and Python Programming
Reverse Engineering, IDA Pro, and assembly language
Project creation and management
Code audit and review
Blockchain
Cryptocurrency
Smart Contracts
Custom course content creation
From backups and data protection, to defending against ransomware
From best password practices to setting up multi-factor authentication
Custom P2P networking, mesh networks, and HF radio projects from a licensed ham operator
Disk recovery, file "un-deletion", and forensic analysis
Forensic incident response