Security & Auth Skills
770 skills in this category Β· Page 3 of 33
Browse the most popular security & auth skills on TrustedSkills.
Spring Boot Security Jwt
Helps with security, JWT as part of implementing security and authentication workflows.
Security Compliance
Automates security checks against Davila7's compliance frameworks, identifying gaps and suggesting remediation steps.
Clerk Auth
Automates user authentication workflows within JezWeb applications, enhancing security and reducing manual authorization tasks.
Owasp Security Check
Identifies potential OWASP Top 10 vulnerabilities in web applications based on provided code or URLs.
Security Auditor
Identifies potential vulnerabilities and misconfigurations in cloud environments based on industry best practices.
Auth Web Cloudbase
Helps with authentication, web development as part of implementing security and authentication workflows.
Auth Tool Cloudbase
Securely manage user authentication and authorization within Tencent CloudBase environments using this powerful tool.
Unit Test Security Authorization
Helps with testing, security as part of implementing security and authentication workflows.
Api Security Hardening
Helps with API, security as part of implementing security and authentication workflows.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Senior Security
Identifies and mitigates complex cybersecurity threats based on senior expert Alireza Rezvani's knowledge and best practices.
Security Scanning Tools
Automates vulnerability scans using Nessus, OpenVAS, and other tools to identify network and system weaknesses.
Api Security Best Practices
Helps with API, security, best practices as part of implementing security and authentication workflows.
Shodan Reconnaissance And Pentesting
This skill uses Shodan to identify vulnerable online services, enabling rapid reconnaissance and simulated penetration testing for security assessments.
Cc Skill Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Broken Authentication Testing
Simulates and identifies vulnerabilities in authentication flows, like password resets and multi-factor bypasses.
Information Security Manager Iso27001
Manages ISO 27001 compliance, risk assessments, controls implementation, and documentation for robust information security.
Security Auditor
Identifies vulnerabilities, misconfigurations, and compliance gaps in systems using advanced scanning and analysis techniques.
Data Privacy Compliance
Ensures data handling aligns with regulations like GDPR & CCPA, minimizing privacy risks and compliance gaps.
V4 Security Foundations
Provides foundational Uniswap smart contract security best practices, common vulnerabilities, and mitigation strategies.
Security Compliance Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Information Security Manager Iso27001
Manages ISO 27001 compliance, assesses risks, and generates reports for robust information security governance.
Access Control Rbac
This RBAC skill manages user access permissions to resources, ensuring secure and granular control for enhanced system protection.
Recipe Triage Security Alerts
Automatically prioritizes and routes Google Workspace security alerts based on severity and potential impact.