Security & Auth Skills
770 skills in this category Β· Page 18 of 33
Browse the most popular security & auth skills on TrustedSkills.
Security Awareness Training
Delivers interactive, personalized cybersecurity training modules to employees, reducing phishing susceptibility and improving overall security posture.
Security Auditing
Identifies potential vulnerabilities and misconfigurations in systems and code through automated security checks.
Security Threat Model
Helps with security, data modeling as part of implementing security and authentication workflows.
Architecting Security
Designs robust, layered security architectures incorporating best practices and mitigating potential vulnerabilities based on provided context.
Security
Automates developer security checks, integrating into workflows to proactively identify and remediate vulnerabilities early.
Baseline Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Goth Echo Security
Analyzes network traffic patterns using gothic aesthetic principles to detect subtle anomalies indicative of intrusion attempts.
Workflow Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Better Auth
Automates secure authentication workflows, reducing errors and improving compliance using advanced credential management techniques.
Api Key Auth Setup
Helps with API, authentication, setup and configuration as part of implementing security and authentication workflows.
Auth Http Api Cloudbase
Helps with authentication, API as part of implementing security and authentication workflows.
Auth Manager
Automates user authentication, authorization, and access control based on defined policies and roles.
Clawdbot Self Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Pentest Ai Llm Security
Helps with AI, LLMs, security as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Bmad Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Llvm Security
Analyzes LLVM compiler code for potential vulnerabilities like buffer overflows and format string bugs.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Container Security Testing
Helps with security, testing as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Security Requirement Extraction
Extracts specific security requirements from text documents, ensuring compliance and reducing potential vulnerabilities.
Security Testing
Helps with security, testing as part of implementing security and authentication workflows.
Pentest Business Logic
This skill automates business logic penetration testing to identify vulnerabilities in application workflows and improve overall security posture.
Better Auth
Enhances authentication robustness using advanced techniques developed by Giuseppe Trisciuoglio for improved security posture.