Canadian employers care less about the number of tools you can name and more about whether you can explain what happened, what evidence supports your conclusion, and what to do next. A portfolio of notes — packet captures analyzed, logs correlated, exposure checks validated, short incident-style writeups — carries more weight than a certifications list.
Use the threat pages and tool pages here together. Read a threat workflow (phishing, DNS abuse, exposed services), study the related tool guides, run a lab exercise, then write down what you found. That sequence produces real operational understanding.
If you are building a public portfolio, keep it white-hat and defensive. Show evidence collection, baseline comparison, troubleshooting logic, and remediation reasoning. Do not post offensive instructions or scan results from systems you do not own.