Offensive security, red team, white hat hacking, and ethical hacking…etc. proactive approach by playing the part of the intruder, trying to find vulnerabilities before the bad guys do.
Skills Required – Cryptography, Penetration testing, Computer networking, Scripting