Sitemap
All pages on precursorsecurity.com
Main
Offensive Security
- Overview
- Penetration Testing
- Penetration Testing Cost
- Types of Penetration Testing
- Pentest vs Vulnerability Scanning
- SPA Penetration Testing
- Web Application Pentest
- API Security Testing
- SSO Configuration Assessment
- External Network Pentest
- OSINT Assessment
- Internal Network Pentest
- Active Directory Assessment
- AD Password Audit
- Citrix VDI Breakout
- Network Segmentation Testing
- Wireless Network Pentest
- Mobile Application Pentest
- Android App Assessment
- iOS App Assessment
- Cloud Penetration Testing
- AWS Penetration Testing
- Azure Penetration Testing
- GCP Penetration Testing
- Microsoft 365 Pentest
- Configuration Reviews
- Server Build Review
- Workstation Build Review
- Firewall Configuration Assessment
- Firewall Rule Audits
- Remote Access / VPN Review
- Database Configuration Assessment
- Cloud Security Configuration
- Red Team Operations
- Adversarial Emulation
- Social Engineering
- Phishing Simulation
- Physical Intrusion Testing
- Vishing & Smishing
- NCSC IT Health Check
- OT / ICS / IoT Security
- Continuous Security Testing
Defensive Security
- Overview
- Security Operations Centre (SOC)
- UK Physical SOC Tour
- Managed Detection & Response (MDR)
- Managed Microsoft 365 Security
- Endpoint Protection & Response
- Identity Threat Detection
- Network Traffic Analysis
- Cloud Security Monitoring
- Bring Your Own EDR
- Incident Response
- Emergency Cyber Breach Support
- Incident Response Retainer
- Digital Forensics Investigation
- Threat Hunting
- Attack Surface Management (EdgeProtect)
Compliance
Sectors
- All Sectors
- Healthcare
- Healthcare Ransomware Protection
- NHS DSP Toolkit Compliance
- Financial Services
- Credential Stuffing Prevention
- DORA Compliance
- Property & Real Estate
- IoT Smart Building Security
- Education
- Phishing Protection for Schools
- Legal Sector
- Retail & E-Commerce
- Energy & Utilities
- Government & Public Sector