{ "category": "Security", "icon": "shield", "skills": [ { "id": "oauth", "name": "OAuth 2.0", "description": "Framework d'autorisation pour APIs", "links": ["https://oauth.net/2/", "https://tools.ietf.org/html/rfc6749"], "icon": "fas-key", "importance": "standard" }, { "id": "jwt", "name": "JSON Web Tokens", "description": "Standard pour transmettre des informations de façon sécurisée", "links": ["https://jwt.io/", "https://tools.ietf.org/html/rfc7519"], "icon": "fas-shield", "importance": "standard" }, { "id": "https-ssl", "name": "HTTPS/SSL", "description": "Protocoles de sécurisation des communications web", "links": [ "https://developer.mozilla.org/en-US/docs/Web/Security", "https://letsencrypt.org/" ], "icon": "fas-cog", "importance": "standard" }, { "id": "owasp", "name": "OWASP", "description": "Bonnes pratiques de sécurité des applications web", "links": ["https://owasp.org/", "https://owasp.org/www-project-top-ten/"], "icon": "fas-cog", "importance": "standard" }, { "id": "csrf-xss", "name": "CSRF/XSS Protection", "description": "Protection contre les attaques CSRF et XSS", "links": [ "https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html", "https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html" ], "icon": "fas-cog", "importance": "standard" }, { "id": "penetration-testing", "name": "Tests de pénétration", "description": "Tests de sécurité offensifs", "links": [ "https://owasp.org/www-community/Penetration_Testing_Methodologies", "https://www.kali.org/" ], "icon": "fas-user-shield", "importance": "standard" }, { "id": "cryptography", "name": "Cryptographie", "description": "Chiffrement et hachage des données", "links": [ "https://cryptography.io/", "https://developer.mozilla.org/en-US/docs/Web/API/Web_Crypto_API" ], "icon": "fas-cog", "importance": "standard" }, { "id": "auth0", "name": "Auth0", "description": "Plateforme d'authentification et d'autorisation", "links": ["https://auth0.com/", "https://auth0.com/docs"], "icon": "fas-cog", "importance": "standard" }, { "id": "keycloak", "name": "Keycloak", "description": "Solution open source de gestion d'identité", "links": [ "https://www.keycloak.org/", "https://www.keycloak.org/documentation" ], "icon": "fas-cog", "importance": "incontournable" }, { "id": "vault", "name": "HashiCorp Vault", "description": "Outil de gestion des secrets", "links": [ "https://www.vaultproject.io/", "https://learn.hashicorp.com/vault" ], "icon": "fas-cog", "importance": "incontournable" }, { "id": "sentinelone", "name": "SentinelOne", "description": "Solution de sécurité des endpoints utilisant l'intelligence artificielle pour la détection et la réponse aux menaces", "links": [ "https://www.sentinelone.com/", "https://docs.sentinelone.com/" ], "icon": "fas-shield-alt", "importance": "standard" }, { "id": "forescout", "name": "Forescout", "description": "Solution de sécurité des réseaux pour la visibilité et le contrôle des appareils connectés", "links": [ "https://www.forescout.com/", "https://www.forescout.com/support/" ], "icon": "fas-network-wired", "importance": "standard" } ] }