Create apps that rate software
Yacht GPS software that is secure
Breach discovery
Ethical hacking
Redesigning a security system
Self-teaching and acquiring certifications
Evaluating security systems
Creating new defense techniques
Uninstalling vulnerable software
Reevaluating and restoring corrupted systems
Investigating and strengthening vulnerabilities
Tracking and monitoring for suspicious activity
YouTube teaching and awareness videos






