Database
Browse 5,303 skills across 372 packs and 37 categories
AllTechnology & Engineering1398Film & Television1111Uncategorized441Visual Arts & Design255Hobbies & Lifestyle226Writing & Literature175Business & Growth163Industry & Specialized159Characters & Companions145Autonomous Agents122Critics & Reviewers110Finance & Legal96People & Leadership84Crypto & Web384Health & Wellness78Journalism & Communications66Enterprise & Operations62Psychology & Mental Health50Education & Family43Natural Sciences43Music & Audio37Photography & Video35Tech Content & Creator34Mathematics & Statistics27Food & Hospitality25Finance & Investing24Performance & Comedy22Architecture & Engineering22Crafts & DIY22Religion & Spirituality20Philosophy & Ethics20Travel & Tourism20History & Heritage20Science & Academia20Non-profit & Social Impact20Languages & Communication12Legal12
Prediction 20Metaverse 16Skill Writing 15Vibe Coding Security 14Corporate Law 12Ecommerce Business 12Production Audit 12Regulatory Compliance 12Cryptocurrency Pro 10Disability Accessibility 10Environmental Sustainability 10Healthcare Nursing 10Litigation Dispute 10Luxury Lifestyle 10Parenting Child Development 10Performing Arts 10Psychology Research 10Public Health 10Robotics Automation 10Social Engineering 10
Showing 1–5 of 5 skills
5 skills found in Uncategorized
Security Awareness Gap Assessment
193LSecurity awareness gap assessment, training effectiveness measurement, and human risk quantification
UncategorizedSocial Engineering Readiness
Helpdesk Abuse Path Assessment
191LHelpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
UncategorizedSocial Engineering Readiness
Phishing Simulation Planning
176LPhishing simulation campaign planning, pretext development, payload design, and metrics collection
UncategorizedSocial Engineering Readiness
Physical Security Review
211LPhysical security assessment, tailgating testing, badge cloning awareness, and facility access review
UncategorizedSocial Engineering Readiness
Process Weakness Identification
185LBusiness process weakness identification, verification flow testing, and social engineering attack path analysis
UncategorizedSocial Engineering Readiness