0% found this document useful (0 votes)
39 views

Skill Matrix

The document provides an assessment of various IT security domains and topics. It rates expertise in each domain on a scale of 1 to 5, with 1 being the highest level of expertise. The document assesses over 100 domains, including infrastructure assessments, mobile device management, forensics, social engineering, cloud security, and privacy/GDPR compliance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Skill Matrix

The document provides an assessment of various IT security domains and topics. It rates expertise in each domain on a scale of 1 to 5, with 1 being the highest level of expertise. The document assesses over 100 domains, including infrastructure assessments, mobile device management, forensics, social engineering, cloud security, and privacy/GDPR compliance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Nombre y Apellidos Código de Alumno Email

Infrastructure Assessment
Fecha Standard Scanning VLAN Hopping/Tagging Active Firewall Testing
DD/MM/AA 1 1 1
sment OS Build Reviews
IDS/IPS Testing VoIP Assessment Windows Linux Solaris BSD MAC OSX
1 1 1 1 1 1 1
Build Reviews Embedded Systems
HP/UX AIX VMWare/ESXi Mainframes IBM Z/OS AS/400 Wireless
1 1 1 1 1 1 1
ystems Firewall Configuration Review
Bluetooth GSM/3G/4G Cisco PIX/ASA Checkpoint Juniper/Netscreen Palo Alto
1 1 1 1 1 1
nfiguration Review Router & Switch Configuration Review
McAfee Enterprise Firewall pfSense *Nix/*BSD Cisco IOS
1 1 1 1
Router & Switch Configuration Review Database Assessment
Software-Defined/Virtual Networks Microsoft SQL Server Oracle MySQL DB2
1 1 1 1 1
se Assessment
Informix Postgres SQLite NoSQL Thin Client (browser-based apps) Silverlight
1 1 1 1 1 1
Web Application Assessment
Flash RMI/CORBA/Applet ActiveX Web Services/API Testing JavaScript Frameworks
1 1 1 1 1
Other Assessments
HTML5 Cloud Security - Microsoft Azure Cloud Security - Amazon AWS
1 1 1
Other Assessments
Thick Client Assessment Hadoop Pin Entry Device (PED)
1 1 1
Source Code Review & Software Development
Secure Development Lifecycle (SDLC) JavaScript Java C#.NET C/C++ Swift
3 3 3 3 3 3
& Software Development
Perl Ruby PHP Python Visual Basic COBOL Bash
3 3 3 3 3 3 3
Enterprise Software & Framework Assessment
Active Directory Microsoft SharePoint SAP SIEBEL WebLogic
3 3 3 3 3
Software & Framework Assessment Mobile Device Managem
Message Queueing (MQ) Oracle E-Business Suite Tivoli Access Manager Airwatch
3 3 3 3
Mobile Device Management (MDM) Assessment
MobileIron Blackberry Enterprise Server (BES) Decompiling and Static Analysis
3 3 3
Reverse Engineering & Static Analysis
Exploit Writing Dynamic Binary Analysis (Debugging) Malware Analysis
3 3 3
ing & Static Analysis
Digital Rights Management (DRM) x86 Assembly ARM Assembly Exploit Analysis
3 3 3 3
Mobile Device Assessments
Blackberry Windows CE iDevice/iOS - iPhone; iPad etc. Android Windows Mobile
3 3 3 3 3
Mobile Application Assessments
Windows Mobile Apps Apple iOS Apps Android Apps Database Forensics
3 3 3 3
Host Analysis - Windows Host Analysis - Linux eDiscovery Forensic Acquisition - PC
3 3 3 3
Forensics and IR
Forensic Acquisition - Mobile Device Forensic Acquisition - Cloud Host Analysis - MAC
3 3 3
Host Analysis - IOS Host Analysis - Android Memory Analysis Database Analysis
3 3 3 3
Incident Management Security Design System Hardening Guides and Implementation
3 3 3
Network Architecture Reviews
Cryptography Policy Creation & Review Development of Secure Coding Guidelines
3 3 3
Continuity and Disaster Recovery (DR) Active Directory and Group Policy ISO 27001
3 3 3
Social Engineering & Red Teaming
Social Engineering Running Phishing Campaigns Red Teaming OSINT Simulated APT
3 3 3 3 3
Consultancy Skills
Insider Threat Client Interaction Report Writing Scoping & Proposals
3 3 3 3
Consultancy Skills
Public Speaking (conferences etc.) Facilitating & Running Workshops
3 3
VHDL Development and Code Audit
Architecture and Design Hardware Teardown Firmware Reverse Engineering
3 3 3
Industrial Control Systems
OCD Features Architecture & Design Data Historians HMI SCADA SIS
3 3 3 3 3 3
Network Monitoring Signature Creation Intelligence Gathering
3 3 3
Compromise Assessments
Underground/Dark Web Research Social Media Research Threat Profiling
3 3 3
ompromise Assessments
Infrastructure Tracking Domain Assessments Secure Development Life Cycle
3 3 3
Threat Modelling Gap Analysis Containerization Docker
3 3 3 3
Security Archi
AWS Cloud Security Architecture Review Azure Cloud Security Architecture Review
1 1
Security Architecture
Office 365 Security Architecture Review Security Architecture Infrastructure Review
1 1
Cyber Security Review
Security Architecture Network Review Assurance CSR CIS Framework CSR NIST Framework
1 1 1 1
ty Review Business Continuity Consultancy
Incident Response Incident Response Policy/Plan Consultancy
1 1
Business Continuity Consultancy
Incident Response Playbook Consultancy Table Top Incident Response Consultancy
1 1
GDPR Briefing GDPR Health Check
1 1
Priva
GDPR Foundation TrainingData Protection Impact Assessment (DPIA) Security Training
1 1
Privacy
Executive Briefing End User Security AwareRole Based Security TrainiSecurity Transformation
1 1 1 1
Security TransformationISO 27001 Readiness Revi ISO 27001 Consultancy Security on Demand
1 1 1 1
Nivel
1
2
3
4
5

You might also like