Files
peakskills/data/skills/security.json
2025-08-27 12:18:40 +02:00

127 lines
3.8 KiB
JSON

{
"category": "Security",
"icon": "shield",
"skills": [
{
"id": "oauth",
"name": "OAuth 2.0",
"description": "Framework d'autorisation pour APIs",
"links": ["https://oauth.net/2/", "https://tools.ietf.org/html/rfc6749"],
"icon": "fas-key",
"importance": "standard"
},
{
"id": "jwt",
"name": "JSON Web Tokens",
"description": "Standard pour transmettre des informations de façon sécurisée",
"links": ["https://jwt.io/", "https://tools.ietf.org/html/rfc7519"],
"icon": "fas-shield",
"importance": "standard"
},
{
"id": "https-ssl",
"name": "HTTPS/SSL",
"description": "Protocoles de sécurisation des communications web",
"links": [
"https://developer.mozilla.org/en-US/docs/Web/Security",
"https://letsencrypt.org/"
],
"icon": "fas-cog",
"importance": "standard"
},
{
"id": "owasp",
"name": "OWASP",
"description": "Bonnes pratiques de sécurité des applications web",
"links": ["https://owasp.org/", "https://owasp.org/www-project-top-ten/"],
"icon": "fas-cog",
"importance": "standard"
},
{
"id": "csrf-xss",
"name": "CSRF/XSS Protection",
"description": "Protection contre les attaques CSRF et XSS",
"links": [
"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html",
"https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html"
],
"icon": "fas-cog",
"importance": "standard"
},
{
"id": "penetration-testing",
"name": "Tests de pénétration",
"description": "Tests de sécurité offensifs",
"links": [
"https://owasp.org/www-community/Penetration_Testing_Methodologies",
"https://www.kali.org/"
],
"icon": "fas-user-shield",
"importance": "standard"
},
{
"id": "cryptography",
"name": "Cryptographie",
"description": "Chiffrement et hachage des données",
"links": [
"https://cryptography.io/",
"https://developer.mozilla.org/en-US/docs/Web/API/Web_Crypto_API"
],
"icon": "fas-cog",
"importance": "standard"
},
{
"id": "auth0",
"name": "Auth0",
"description": "Plateforme d'authentification et d'autorisation",
"links": ["https://auth0.com/", "https://auth0.com/docs"],
"icon": "fas-cog",
"importance": "standard"
},
{
"id": "keycloak",
"name": "Keycloak",
"description": "Solution open source de gestion d'identité",
"links": [
"https://www.keycloak.org/",
"https://www.keycloak.org/documentation"
],
"icon": "fas-cog",
"importance": "incontournable"
},
{
"id": "vault",
"name": "HashiCorp Vault",
"description": "Outil de gestion des secrets",
"links": [
"https://www.vaultproject.io/",
"https://learn.hashicorp.com/vault"
],
"icon": "fas-cog",
"importance": "incontournable"
},
{
"id": "sentinelone",
"name": "SentinelOne",
"description": "Solution de sécurité des endpoints utilisant l'intelligence artificielle pour la détection et la réponse aux menaces",
"links": [
"https://www.sentinelone.com/",
"https://docs.sentinelone.com/"
],
"icon": "fas-shield-alt",
"importance": "standard"
},
{
"id": "forescout",
"name": "Forescout",
"description": "Solution de sécurité des réseaux pour la visibilité et le contrôle des appareils connectés",
"links": [
"https://www.forescout.com/",
"https://www.forescout.com/support/"
],
"icon": "fas-network-wired",
"importance": "standard"
}
]
}