As of September 30, 2022, here is an exhaustive list of Cyber Security Skills supported by WeCP. Check here the complete list of skills supported by WeCP.
Cyber Security Skill | Relevant in Job Roles | Example Task | Question Types |
Network Security | Network Security Analyst, Network Administrator, Security Engineer, Security Consultant, Security Analyst | Design and implement network security protocols to mitigate risks associated with unauthorized access, malware, and other threats | DevOps, Scripting + 10 Others |
Endpoint Security | Security Analyst, Security Engineer, Endpoint Security Engineer, Endpoint Security Analyst, Security Consultant | Develop and implement endpoint security strategies to protect against malware, phishing, and other cyber attacks | DevOps, Scripting + 10 Others |
Cloud Security | Cloud Security Architect, Cloud Security Engineer, Cloud Security Analyst, Cloud Security Consultant, Cloud Security Manager | Assess the security controls of cloud service providers and design strategies to protect against cloud-related cyber threats | DevOps, Scripting + 10 Others |
Identity and Access Management (IAM) | Identity and Access Management (IAM) Analyst, IAM Architect, IAM Consultant, IAM Engineer, Security Analyst | Design and implement access control policies and procedures to protect against unauthorized access to systems and data | DevOps, Scripting + 10 Others |
Data Security | Security Analyst, Data Security Analyst, Security Engineer, Security Consultant, Security Architect | Implement data encryption, data loss prevention, and other security controls to protect sensitive information | DevOps, Scripting + 10 Others |
Threat Intelligence and Incident Response | Incident Response Analyst, Cybersecurity Analyst, Threat Intelligence Analyst, Cybersecurity Engineer, Security Analyst | Develop and implement incident response plans, conduct threat assessments, and perform vulnerability scans and assessments | DevOps, Scripting + 10 Others |
Vulnerability Assessment and Penetration Testing (VAPT) | Penetration Tester, Vulnerability Assessor, Security Analyst, Security Consultant, Security Engineer | Conduct vulnerability assessments and penetration testing to identify security weaknesses and recommend remediation actions | DevOps, Scripting + 10 Others |
Security Auditing and Compliance | Security Auditor, Compliance Analyst, Compliance Manager, Risk Management Analyst, Security Consultant | Conduct security audits and assessments to ensure compliance with regulatory requirements and industry best practices | DevOps, Scripting + 10 Others |
Security Operations Center (SOC) | SOC Analyst, SOC Manager, Security Analyst, Security Engineer, Incident Responder | Monitor and analyze security events and alerts, and respond to security incidents as part of a security operations team | DevOps, Scripting + 10 Others |
Application Security | Application Security Engineer, Application Security Specialist, Security Analyst, Security Consultant, Penetration Tester | Conduct code reviews, security testing, and other assessments to identify and mitigate security vulnerabilities in applications | DevOps, Scripting + 10 Others |
Mobile Device Security | Mobile Security Engineer, Mobile Security Analyst, Security Analyst, Security Consultant, Mobile Device Management (MDM) Specialist | Develop and implement mobile device management policies and procedures to protect against mobile-related cyber threats | DevOps, Scripting + 10 Others |
Cybersecurity Governance | Cybersecurity Manager, Information Security Manager, Security Analyst, Security Consultant, Compliance Manager | Develop and implement security policies and procedures, and oversee compliance with regulatory requirements and industry best practices | DevOps, Scripting + 10 Others |
Social Engineering and Awareness | Security Awareness Trainer, Security Awareness Manager, Security Analyst, Security Consultant, Incident Responder | Conduct security awareness training and phishing simulations to educate employees and prevent social engineering attacks | DevOps, Scripting + 10 Others |
Cryptography | Cryptographer, Cryptography Engineer, Security Analyst, Security Consultant, Security Engineer | Develop and implement cryptographic protocols and algorithms to protect sensitive data and communications | DevOps, Scripting + 10 Others |
Cyber Threat Hunting | Cyber Threat Hunter, Threat Intelligence Analyst, Cybersecurity Analyst, Incident Responder, Security Analyst | Conduct advanced threat hunting and analysis, identify new threats, and develop strategies to mitigate cyber attacks | DevOps, Scripting + 10 Others |
Here's an exhaustive list of cybersecurity tools that WeCP offers assessments on:
Category | Most Popular Usecase | Example Tools |
Firewall | Network Security | Cisco ASA, Check Point Firewall, Palo Alto Networks Firewall |
Antivirus | Malware Detection and Prevention | McAfee Antivirus, Norton Antivirus, Avast Antivirus |
Intrusion Detection and Prevention Systems (IDPS) | Threat Detection and Prevention | Snort, Bro, Suricata |
Vulnerability Scanner | Vulnerability Detection and Management | Nessus, Qualys, OpenVAS |
Penetration Testing tools | Security Assessment and Penetration Testing | Metasploit, Nmap, Burp Suite |
Data Loss Prevention (DLP) tools | Data Protection and Compliance | Symantec DLP, Forcepoint DLP, Digital Guardian |
Security Information and Event Management (SIEM) tools | Threat Intelligence and Log Management | Splunk, LogRhythm, ArcSight |
Identity and Access Management (IAM) tools | Identity and Access Management | Okta, Ping Identity, OneLogin |
Encryption tools | Data Encryption | VeraCrypt, BitLocker, GnuPG |
Multi-Factor Authentication (MFA) tools | User Authentication | Google Authenticator, Microsoft Authenticator, RSA SecurID |
Web Application Firewall (WAF) tools | Web Application Security | ModSecurity, F5 Networks WAF, Akamai Kona Site Defender |
Network Access Control (NAC) tools | Network Security and Access Management | Cisco ISE, Aruba ClearPass, Forescout CounterACT |
Security Assessment and Compliance tools | Compliance Management and Risk Assessment | Qualys, Tenable.io, Rapid7 |
Security Operations Center (SOC) tools | Security Operations Management | IBM QRadar, McAfee ESM, RSA NetWitness |
Incident Response tools | Incident Response and Management | FireEye, CrowdStrike Falcon, Carbon Black |