Test Library | Pre-Employment Tests for all Job Roles

Measure your candidates on
information security job skills and tools

Clear filters
Linux Endpoint
Linux Endpoint
Clock 10 min
Network Security
Tests for Network security best practices on detecting and preventing unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Clock 10 min
Dev Ops
Dev Ops
Clock 10 min
Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. Used effectively Metaplost can save precious time during an audit. This test asseses a candidates solid underating of Metasploits usage based on hands on scenario
Clock 10 min
OWASP TOP 10
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
Clock 10 min
OWASP API Security Top 10
A foundational element of innovation in today’s app-driven world is the API. From banks, retail and transportation to IoT, autonomous vehicles and smart cities, APIs are a critical part of modern mobile, SaaS and web applications and can be found in customer-facing, partner-facing and internal applications. By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).
Clock 10 min
Windows Forensics
Windows Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity
Clock 10 min
Linux Forensics
Linux Forencis tests comprehensive digital forensics knowledge of Microsoft Windows operating systems in capturing and analyzing forensic artifacts to determine user activity
Clock 10 min
Securing DevOps
Securing Devops tests the indivituals tasked with Security Operations ability to setup secure web applications that follow the industry recognized recommendations
Clock 10 min
AWS Security
Best practices for securely operating in Amazon Web Services
Clock 10 min
Android Forensics
Android Forensics
Clock 10 min
Burp Suite
Burp Suite test is about
Clock 10 min
Web Pentesting
Web Pentesting
Clock 10 min
Network Pentesting
Network Pentesting
Clock 10 min
Linux Pentesting
Linux Pentesting
Clock 10 min
Nmap
Nmap test
Clock 10 min
WireShark
The Wireshark test assess the ability to analyze packet captures from a network connection with a view of determining the who, what and when of a captured pcap
Clock 10 min
psExec
psExec
Clock 10 min
Socat
socat
Clock 10 min
Fuzzing
Fuzzing
Clock 10 min
Memory Corruption
Memory Corruption
Clock 10 min
Memory Corruption Mitigations
Memory Corruption Mitigations
Clock 10 min
Threat Modelling
Threat Modelling
Clock 10 min
SQL injection
SQL injection
Clock 10 min
Web Security
WebSecurity
Clock 10 min
Malware Analysis
Malware Analysis
Clock 10 min
Active Directory
Active Directory
Clock 10 min
Linux Privex
Linux Priviledge Excalation
Clock 10 min
Linux Privex2
Linux Priviledge Excalation
Clock 30 min
MITRE ATT&CK
MITRE ATT&CK
Clock 10 min
Microsoft Azure Security
Microsoft Azure Security
Clock 10 min
Google Cloud Platform Security
Google Cloud Platform Security
Clock 10 min
Penetration Tester
A pentester is a professional who evaluates the security of an organization's systems and applications by simulating real-world attacks. Their role involves identifying and exploiting vulnerabilities, reporting findings, and advising the organization on how to improve their security posture. The goal of a pentester is to provide organizations with a comprehensive understanding of their security risks and to help them defend against potential threats.
Clock 10 min
Cloud Security
Cloud security professionals are responsible for protecting data and systems in cloud computing environments. This involves implementing security measures, monitoring for threats, and responding to security incidents. Cloud security professionals must have a deep understanding of cloud technologies, as well as knowledge of security best practices and industry standards. The role requires a combination of technical skills and business acumen to ensure that cloud systems are secure, compliant, and meet the needs of the organization.
Clock 30 min
Loading...