115 lines
3.4 KiB
JSON
115 lines
3.4 KiB
JSON
{
|
|
"category": "Security",
|
|
"icon": "shield",
|
|
"skills": [
|
|
{
|
|
"id": "oauth",
|
|
"name": "OAuth 2.0",
|
|
"description": "Framework d'autorisation pour APIs",
|
|
"links": ["https://oauth.net/2/", "https://tools.ietf.org/html/rfc6749"],
|
|
"icon": "fas-key"
|
|
},
|
|
{
|
|
"id": "jwt",
|
|
"name": "JSON Web Tokens",
|
|
"description": "Standard pour transmettre des informations de façon sécurisée",
|
|
"links": ["https://jwt.io/", "https://tools.ietf.org/html/rfc7519"],
|
|
"icon": "fas-shield"
|
|
},
|
|
{
|
|
"id": "https-ssl",
|
|
"name": "HTTPS/SSL",
|
|
"description": "Protocoles de sécurisation des communications web",
|
|
"links": [
|
|
"https://developer.mozilla.org/en-US/docs/Web/Security",
|
|
"https://letsencrypt.org/"
|
|
],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "owasp",
|
|
"name": "OWASP",
|
|
"description": "Bonnes pratiques de sécurité des applications web",
|
|
"links": ["https://owasp.org/", "https://owasp.org/www-project-top-ten/"],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "csrf-xss",
|
|
"name": "CSRF/XSS Protection",
|
|
"description": "Protection contre les attaques CSRF et XSS",
|
|
"links": [
|
|
"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html",
|
|
"https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html"
|
|
],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "penetration-testing",
|
|
"name": "Tests de pénétration",
|
|
"description": "Tests de sécurité offensifs",
|
|
"links": [
|
|
"https://owasp.org/www-community/Penetration_Testing_Methodologies",
|
|
"https://www.kali.org/"
|
|
],
|
|
"icon": "fas-user-shield"
|
|
},
|
|
{
|
|
"id": "cryptography",
|
|
"name": "Cryptographie",
|
|
"description": "Chiffrement et hachage des données",
|
|
"links": [
|
|
"https://cryptography.io/",
|
|
"https://developer.mozilla.org/en-US/docs/Web/API/Web_Crypto_API"
|
|
],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "auth0",
|
|
"name": "Auth0",
|
|
"description": "Plateforme d'authentification et d'autorisation",
|
|
"links": ["https://auth0.com/", "https://auth0.com/docs"],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "keycloak",
|
|
"name": "Keycloak",
|
|
"description": "Solution open source de gestion d'identité",
|
|
"links": [
|
|
"https://www.keycloak.org/",
|
|
"https://www.keycloak.org/documentation"
|
|
],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "vault",
|
|
"name": "HashiCorp Vault",
|
|
"description": "Outil de gestion des secrets",
|
|
"links": [
|
|
"https://www.vaultproject.io/",
|
|
"https://learn.hashicorp.com/vault"
|
|
],
|
|
"icon": "fas-cog"
|
|
},
|
|
{
|
|
"id": "sentinelone",
|
|
"name": "SentinelOne",
|
|
"description": "Solution de sécurité des endpoints utilisant l'intelligence artificielle pour la détection et la réponse aux menaces",
|
|
"links": [
|
|
"https://www.sentinelone.com/",
|
|
"https://docs.sentinelone.com/"
|
|
],
|
|
"icon": "fas-shield-alt"
|
|
},
|
|
{
|
|
"id": "forescout",
|
|
"name": "Forescout",
|
|
"description": "Solution de sécurité des réseaux pour la visibilité et le contrôle des appareils connectés",
|
|
"links": [
|
|
"https://www.forescout.com/",
|
|
"https://www.forescout.com/support/"
|
|
],
|
|
"icon": "fas-network-wired"
|
|
}
|
|
]
|
|
}
|