Security & Auth Skills
770 skills in this category Β· Page 5 of 33
Browse the most popular security & auth skills on TrustedSkills.
Shodan Reconnaissance And Pentesting
This skill uses Shodan to identify vulnerable online services, aiding in reconnaissance and penetration testing for security assessments.
Eve Auth And Secrets
Securely manages authentication credentials and secrets across systems, minimizing exposure and enhancing operational security.
Drupal Security
Identifies Drupal vulnerabilities, suggests remediation steps, and checks module compatibility based on madsnorgaard's expertise.
Mobile Security Coder
Helps with mobile development, security as part of implementing security and authentication workflows.
Accessibility Compliance
Ensures digital content meets accessibility standards (WCAG) for inclusivity and legal compliance, minimizing risk & broadening user reach.
Broken Authentication Testing
Simulates broken authentication flows to identify vulnerabilities in applications and APIs, per davila7's testing methodology.
Api Security Review
Helps with API, security, code review as part of implementing security and authentication workflows.
Csrf Protection
Csrf Protection safeguards against Cross-Site Request Forgery attacks by validating user requests, ensuring data integrity and preventing malicious manipulation.
Oauth2 Authentication
Securely verifies user identities and grants access to resources using OAuth 2.0 standards, enhancing application security and streamlining user logins.
Security Suite
Automates vulnerability scanning, intrusion detection, and threat response to bolster system defenses.
Wordpress Security Validation
Helps with security, validation as part of implementing security and authentication workflows.
Network Security Groups
Manage Azure Network Security Groups to control network traffic and enhance cloud resource protection.
Symfony:Api Platform Security
Helps with API, security as part of implementing security and authentication workflows.
Security Scanning Security Dependencies
Identifies vulnerable dependencies in project files, providing remediation advice to enhance application security.
Frontend Security
Helps with frontend development, security as part of implementing security and authentication workflows.
Security Compliance Compliance Check
Automates checks against specified security and compliance standards, identifying potential violations and remediation steps.
Security Scanning Security Sast
Automates SAST scans, identifying vulnerabilities in codebases with detailed reports and remediation guidance.
Code Review Security
Helps with code review, security as part of implementing security and authentication workflows.
Mobile Security
Helps with mobile development, security as part of implementing security and authentication workflows.
Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.
Security Engineer
Automates vulnerability scanning, remediation planning, and configuration hardening based on industry best practices.
Authentication
Verifies user identities securely, ensuring only authorized individuals access systems and data β crucial for robust security.
Security Patterns
Helps with security, patterns as part of implementing security and authentication workflows.
Security Requirement Extraction
Extracts detailed security requirements from unstructured text like policies, reports, and incident logs.