Relevant System Proficiency

Wireshark

Searching For Certain Protocols

Ethical Hacking

John The Ripper Password Cracking

Passive Reconnaissance