"wireshark and portsniffers" require "proximity". In order to capture packets (wireshark) of what is coming out of your WAN port, he'd need to know the assigned IP address. If you are behind a cable modem, he'd need to know the IP address assigned to it. Depending on the infrastructure of your ISP, he may not be able to get to it.
Port sniffers, pretty much the same thing.
Is it possible that he also installed something on equipment in your home network to provide access/data? Yes, that's the way malware/virus/ransomware do a lot of things.
Sending logs elsewhere: Yes, it's possible.
The default pfSense install is:
Everything originating from LAN side is allowed out WAN
Everything originating from WAN side is blocked UNLESS it is a response to LAN traffic.
The second point only matters if you are running a service you want accessible from the public internet (web server, ftp server, etc).
A simple thing to do would be to post screenshots of the rules that are configured on your WAN, LAN interfaces, any floating rules. A list of installed packages would also help.
If he's busting chops to make sure you learn and understand that's good, just don't let trust overrule common sense.