Measure your candidates on
information security job skills and tools
Popular
Linux Endpoint
Linux Endpoint
Popular
Network Security
Tests for Network security best practices on detecting and preventing unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Popular
Dev Ops
Dev Ops
Popular
Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. Used effectively Metaplost can save precious time during an audit. This test asseses a candidates solid underating of Metasploits usage based on hands on scenario
Popular
OWASP TOP 10
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
Popular
OWASP API Security Top 10
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible.
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).
Popular
Windows Forensics
Windows Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity
Popular
Linux Forensics
Linux Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity
Popular
Securing DevOps
Securing Devops tests the indivituals tasked with Security Operations ability to setup secure web applications that follow the industry recognized recommendations
Popular
AWS Security
Best practices for securely operating in Amazon Web Services
Popular
Android Forensics
Android Forensics
Popular
Burp Suite
Burp Suite test is about
Popular
Web Pentesting
Web Pentesting
Popular
Network Pentesting
Network Pentesting
Popular
Linux Pentesting
Linux Pentesting
Popular
Nmap
Nmap test
Popular
WireShark
The Wireshark test assess the ability to analyze packet captures from a network connection with a view of determining the who, what and when of a captured pcap
Popular
psExec
psExec
Popular
Socat
socat
Popular
Fuzzing
Fuzzing
Popular
Memory Corruption
Memory Corruption
Popular
Memory Corruption Mitigations
Memory Corruption Mitigations
Popular
Threat Modelling
Threat Modelling
Popular
SQL injection
SQL injection
Popular
Web Security
WebSecurity
Popular
Malware Analysis
Malware Analysis
Popular
Active Directory
Active Directory
Popular
Linux Privex
Linux Priviledge Excalation
Popular
Linux Privex2
Linux Priviledge Excalation
Popular
MITRE ATT&CK
MITRE ATT&CK
Popular
Microsoft Azure Security
Microsoft Azure Security
Popular
Google Cloud Platform Security
Google Cloud Platform Security
Popular
Penetration Tester
A pentester is a professional who evaluates the security of an organization's systems and applications by simulating real-world attacks. Their role involves identifying and exploiting vulnerabilities, reporting findings, and advising the organization on how to improve their security posture. The goal of a pentester is to provide organizations with a comprehensive understanding of their security risks and to help them defend against potential threats.
Popular
Cloud Security
Cloud security professionals are responsible for protecting data and systems in cloud computing environments. This involves implementing security measures, monitoring for threats, and responding to security incidents.
Cloud security professionals must have a deep understanding of cloud technologies, as well as knowledge of security best practices and industry standards. The role requires a combination of technical skills and business acumen to ensure that cloud systems are secure, compliant, and meet the needs of the organization.