Security & Auth Skills
770 skills in this category Β· Page 8 of 33
Browse the most popular security & auth skills on TrustedSkills.
Better Auth Emails
Generates phishing-resistant, user-friendly authentication emails to improve login security and reduce account compromise.
Powershell Security Hardening
Automates PowerShell scripts to enforce Windows security hardening best practices, reducing attack surface and improving system resilience.
Security First 2025
Proactively identifies and mitigates emerging cybersecurity threats using predictive modeling and 2025 attack surface analysis.
Using Authentication
This skill securely verifies user identities through authentication methods, bolstering application and system protection against unauthorized access.
Oauth Implementation
Provides OAuth guidance and assistance for implementing security and authentication.
Ln 760 Security Setup
Helps with security, setup and configuration as part of implementing security and authentication workflows.
Security Ownership Map
Visually maps ownership and access rights across systems to identify vulnerabilities and streamline security compliance.
Security Scanner
Identifies vulnerabilities in websites and applications using automated scans and reports potential risks.
Compliance Checker
This Compliance Checker verifies if your content adheres to specified rules and regulations, ensuring security and mitigating risks.
Git Security 2025
Helps with Git, security as part of implementing security and authentication workflows.
Rbac Permissions Builder
This skill builds Role-Based Access Control (RBAC) permission structures quickly, streamlining security setup and ensuring appropriate user access rights.
Kernel Auth
Verifies kernel module signatures and integrity to prevent unauthorized driver loading and system compromise.
Better Auth
Enhances authentication robustness by analyzing login patterns and proactively blocking suspicious access attempts.
Security Auditor
Identifies potential vulnerabilities and misconfigurations in cloud environments based on industry best practices and erichowens' expertise.
Powershell Security
Automates PowerShell remediation tasks to enforce security policies and harden Windows systems based on best practices.
Security
Identifies and mitigates potential cybersecurity threats using advanced analysis and automated remediation techniques.
Instance Security
Groeimetai's instance-security proactively isolates and remediates vulnerabilities within individual application instances to prevent breaches.
B2C Slas Auth Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Heartwood Auth
Authenticates users against legacy systems using biometrics and contextual data, minimizing password reliance.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Acl Security
Analyzes access control lists (ACLs) to identify vulnerabilities, misconfigurations, and compliance violations.
Security Operations
Automates threat detection, incident response, and vulnerability management to strengthen your organization's defenses.
Gathering Security
Collects and synthesizes threat intelligence reports, vulnerability data, and security advisories from diverse sources.
Api Authentication
Provides API guidance and assistance for implementing security and authentication.