II.
Specialization overview
Reference · livespecialization:security-research
specialization:security-research overview
Inspect the raw attributes, linked wiki pages, and inbound or outbound graph edges for specialization:security-research.
Attributes
No attributes.
Outgoing edges
specializes1
- domain:security·DomainSecurity
uses_tool4
- tool:owasp-zap·ToolOWASP ZAP
- tool:snyk·ToolSnyk
- tool:trivy·ToolTrivy
- tool:checkov·ToolCheckov
Incoming edges
applies_to22
- skill-area:vulnerability-scanning-remediation·SkillAreaVulnerability Scanning and Remediation
- skill-area:penetration-testing-ethical-hacking·SkillAreaPenetration Testing and Ethical Hacking
- skill-area:threat-intelligence-hunting·SkillAreaThreat Intelligence and Hunting
- skill-area:code-cybersecurity·SkillAreaCode Cybersecurity
- skill-area:binary-analysis·SkillAreaBinary Analysis
- skill-area:reverse-engineering·SkillAreaReverse Engineering
- skill-area:exploit-development·SkillAreaExploit Development
- skill-area:zero-trust-architecture·SkillAreaZero Trust Architecture
- skill-area:SBOM-management·SkillAreaSBOM Management
- skill-area:container-hardening·SkillAreaContainer Hardening
- skill-area:key-rotation·SkillAreaKey Rotation
- skill-area:web-security·SkillAreaWeb Application Security
- skill-area:sast·SkillAreaStatic Application Security Testing (SAST)
- skill-area:dast·SkillAreaDynamic Application Security Testing (DAST)
- skill-area:threat-modeling·SkillAreaThreat Modeling
- skill-area:secret-scanning·SkillAreaSecret Scanning
- skill-area:dependency-vulnerability-mgmt·SkillAreaDependency Vulnerability Management
- skill-area:supply-chain-security·SkillAreaSoftware Supply Chain Security
- skill-area:container-security·SkillArea
- skill-area:network-security·SkillAreaNetwork Security
- skill-area:identity-security·SkillAreaIdentity & Access Security
- skill-area:fuzz-testing·SkillAreaFuzz Testing
contains1
- domain:security·DomainSecurity
documents1
- page:library-security-research·PageSecurity Research and Vulnerability Analysis Specialization (Library)
lib_belongs_to_specialization67
- lib-agent:security-research--cloud-security-researcher·LibraryAgentcloud-security-researcher
- lib-agent:security-research--ctf-creator·LibraryAgentCTF Challenge Creator Agent
- lib-agent:security-research--exploit-developer·LibraryAgentExploit Developer Agent
- lib-agent:security-research--fuzzing-engineer·LibraryAgentfuzzing-engineer
- lib-agent:security-research--hardware-security-researcher·LibraryAgenthardware-security-researcher
- lib-agent:security-research--malware-analyst·LibraryAgentMalware Analyst Agent
- lib-agent:security-research--mobile-researcher·LibraryAgentMobile Security Researcher Agent
- lib-agent:security-research--purple-team-coordinator·LibraryAgentPurple Team Coordinator Agent
- lib-agent:security-research--red-team-operator·LibraryAgentRed Team Operator Agent
- lib-agent:security-research--reverse-engineer·LibraryAgentReverse Engineer Agent
- lib-agent:security-research--security-report-writer·LibraryAgentSecurity Report Writer Agent
- lib-agent:security-research--smart-contract-auditor·LibraryAgentSmart Contract Auditor Agent
- lib-agent:security-research--threat-intel-analyst·LibraryAgentThreat Intelligence Analyst Agent
- lib-agent:security-research--vuln-researcher·LibraryAgentVulnerability Researcher Agent
- lib-agent:security-research--web-security-researcher·LibraryAgentWeb Security Researcher Agent
- lib-process:security-research--ai-ml-security-research·LibraryProcessai-ml-security-research
- lib-process:security-research--api-security-research·LibraryProcessapi-security-research
- lib-process:security-research--binary-reverse-engineering·LibraryProcessbinary-reverse-engineering
- lib-process:security-research--bug-bounty-workflow·LibraryProcessbug-bounty-workflow
- lib-process:security-research--capture-the-flag-challenges·LibraryProcesscapture-the-flag-challenges
- lib-process:security-research--cloud-security-research·LibraryProcesscloud-security-research
- lib-process:security-research--container-security-research·LibraryProcesscontainer-security-research
- lib-process:security-research--dynamic-analysis-runtime-testing·LibraryProcessdynamic-analysis-runtime-testing
- lib-process:security-research--exploit-development·LibraryProcessexploit-development
- lib-process:security-research--firmware-analysis·LibraryProcessfirmware-analysis
- lib-process:security-research--fuzzing-campaign·LibraryProcessfuzzing-campaign
- lib-process:security-research--hardware-security-research·LibraryProcesshardware-security-research
- lib-process:security-research--malware-analysis·LibraryProcessmalware-analysis
- lib-process:security-research--mobile-app-security-research·LibraryProcessmobile-app-security-research
- lib-process:security-research--network-penetration-testing·LibraryProcessnetwork-penetration-testing
- lib-process:security-research--protocol-reverse-engineering·LibraryProcessprotocol-reverse-engineering
- lib-process:security-research--purple-team-exercise·LibraryProcesspurple-team-exercise
- lib-process:security-research--red-team-operations·LibraryProcessred-team-operations
- lib-process:security-research--responsible-disclosure·LibraryProcessresponsible-disclosure
- lib-process:security-research--security-advisory-writing·LibraryProcesssecurity-advisory-writing
- lib-process:security-research--security-research-lab-setup·LibraryProcesssecurity-research-lab-setup
- lib-process:security-research--security-research-publication·LibraryProcesssecurity-research-publication
- lib-process:security-research--security-tool-development·LibraryProcesssecurity-tool-development
- lib-process:security-research--shellcode-development·LibraryProcessshellcode-development
- lib-process:security-research--smart-contract-auditing·LibraryProcesssmart-contract-auditing
- lib-process:security-research--static-code-analysis·LibraryProcessstatic-code-analysis
- lib-process:security-research--supply-chain-security·LibraryProcesssupply-chain-security
- lib-process:security-research--threat-intelligence-research·LibraryProcessthreat-intelligence-research
- lib-process:security-research--variant-analysis·LibraryProcessvariant-analysis
- lib-process:security-research--vulnerability-research-workflow·LibraryProcessvulnerability-research-workflow
- lib-process:security-research--vulnerability-root-cause-analysis·LibraryProcessvulnerability-root-cause-analysis
- lib-process:security-research--web-app-vuln-research·LibraryProcessweb-app-vuln-research
- lib-skill:security-research--aiml-security·LibrarySkillaiml-security
- lib-skill:security-research--binary-exploitation·LibrarySkillBinary Exploitation Skill
- lib-skill:security-research--burp-websec·LibrarySkillBurp Suite/Web Security Skill
- lib-skill:security-research--cloud-security-testing·LibrarySkillcloud-security-testing
- lib-skill:security-research--cve-cwe-db·LibrarySkillCVE/CWE Database Skill
- lib-skill:security-research--debugger-integration·LibrarySkillDebugger Integration Skill
- lib-skill:security-research--fuzzing-ops·LibrarySkillFuzzing Operations Skill
- lib-skill:security-research--ghidra-ida-re·LibrarySkillGhidra/IDA Reverse Engineering Skill
- lib-skill:security-research--hardware-security·LibrarySkillhardware-security
- lib-skill:security-research--incident-forensics·LibrarySkillincident-forensics
- lib-skill:security-research--mitre-attack·LibrarySkillMITRE ATT&CK Skill
- lib-skill:security-research--mobile-security·LibrarySkillMobile Security Testing Skill
- lib-skill:security-research--offensive-security·LibrarySkillOffensive Security Skill
- lib-skill:security-research--protocol-analysis·LibrarySkillNetwork Protocol Analysis Skill
- lib-skill:security-research--pwntools-exploit·LibrarySkillPwntools Exploitation Skill
- lib-skill:security-research--security-sandbox·LibrarySkillsecurity-sandbox
- lib-skill:security-research--smart-contract-analysis·LibrarySkillSmart Contract Analysis Skill
- lib-skill:security-research--static-analysis-tools·LibrarySkillStatic Analysis Tools Skill
- lib-skill:security-research--stix-taxii·LibrarySkillSTIX/TAXII Intelligence Skill
- lib-skill:security-research--yara-rules·LibrarySkillYARA Rules Skill
requires_skill2
- role:privacy-engineer·RolePrivacy Engineer
- role:security-engineer·RoleSecurity Engineer