Measure your candidates on
information security job skills and tools

Linux Endpoint
Linux Endpoint

Network Security
Tests for Network security best practices on detecting and preventing unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Dev Ops
Dev Ops

Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. Used effectively Metaplost can save precious time during an audit. This test asseses a candidates solid underating of Metasploits usage based on hands on scenario

OWASP TOP 10
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

OWASP API Security Top 10
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible.
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).

Windows Forensics
Windows Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity

Linux Forensics
Linux Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity

Securing DevOps
Securing Devops tests the indivituals tasked with Security Operations ability to setup secure web applications that follow the industry recognized recommendations

AWS Security
Best practices for securely operating in Amazon Web Services

Android Forensics
Android Forensics

Burp Suite
Burp Suite test is about

Web Pentesting
Web Pentesting

Network Pentesting
Network Pentesting

Linux Pentesting
Linux Pentesting

Nmap
Nmap test

WireShark
The Wireshark test assess the ability to analyze packet captures from a network connection with a view of determining the who, what and when of a captured pcap

psExec
psExec

Socat
socat

Fuzzing
Fuzzing

Memory Corruption
Memory Corruption

Memory Corruption Mitigations
Memory Corruption Mitigations

Threat Modelling
Threat Modelling

SQL injection
SQL injection

Web Security
WebSecurity

Malware Analysis
Malware Analysis

Active Directory
Active Directory

Linux Privex
Linux Priviledge Excalation

Linux Privex2
Linux Priviledge Excalation

MITRE ATT&CK
MITRE ATT&CK

Microsoft Azure Security
Microsoft Azure Security

Google Cloud Platform Security
Google Cloud Platform Security

Penetration Tester
A pentester is a professional who evaluates the security of an organization's systems and applications by simulating real-world attacks. Their role involves identifying and exploiting vulnerabilities, reporting findings, and advising the organization on how to improve their security posture. The goal of a pentester is to provide organizations with a comprehensive understanding of their security risks and to help them defend against potential threats.

Cloud Security
Cloud security professionals are responsible for protecting data and systems in cloud computing environments. This involves implementing security measures, monitoring for threats, and responding to security incidents.
Cloud security professionals must have a deep understanding of cloud technologies, as well as knowledge of security best practices and industry standards. The role requires a combination of technical skills and business acumen to ensure that cloud systems are secure, compliant, and meet the needs of the organization.
