Security & Auth Skills
770 skills in this category Β· Page 21 of 33
Browse the most popular security & auth skills on TrustedSkills.
Databricks Security Basics
Understand and implement Databricks workspace access controls, secrets management, and network configurations for enhanced security.
Groq Security Basics
Provides foundational cybersecurity knowledge & best practices using Groq's architecture, focusing on data protection and threat mitigation.
Code Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Security Architecture Overview
Provides a high-level overview of existing security architecture, identifying key components and potential gaps.
Analyzing Security Headers
Analyzes HTTP response headers to identify potential security vulnerabilities like missing CSP or X-Frame-Options directives.
Juicebox Security Basics
Understand common Juicebox vulnerabilities, mitigation techniques, and best practices for secure development.
Checking Session Security
Analyzes session data to identify potential vulnerabilities like hijacking, replay attacks, and unusual access patterns.
Security Audit Pro
Helps with security, auditing as part of implementing security and authentication workflows.
Mistral Security Basics
Provides foundational cybersecurity knowledge, including common threats, best practices, and basic incident response guidance.
Security Reviewer
Analyzes code and configurations for common vulnerabilities, suggesting remediation steps based on industry best practices.
Scanning Api Security
Helps with API, security as part of implementing security and authentication workflows.
Audit Openclaw Security
Helps with auditing, security as part of implementing security and authentication workflows.
Openclaw Security
Identifies and mitigates vulnerabilities in open-source projects using automated code analysis and threat modeling.
Sentinel Ai Security
Helps with AI, security as part of implementing security and authentication workflows.
Performing Security Code Review
Helps with security, code review as part of implementing security and authentication workflows.
Researchers Security
Identifies and mitigates potential cybersecurity vulnerabilities in research data and workflows using advanced analysis techniques.
Security Frameworks
Analyzes code and infrastructure against industry-standard security frameworks like NIST and CIS to identify vulnerabilities.
Ai Powered Pentesting
Automated vulnerability scanning and exploitation simulation using AI to identify weaknesses in systems and applications.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Security Audit And Vulnerability Scanning
Helps with security, auditing as part of implementing security and authentication workflows.
Web Security
Helps with web development, security as part of implementing security and authentication workflows.
Compliance Audit
Automatically scans systems against defined compliance standards, generating detailed audit reports and identifying potential violations.
Better Auth Best Practices
Helps with authentication, best practices as part of implementing security and authentication workflows.
Solidity Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.