Search Skills
Search across 54932 indexed skills
implementing-scim-provisioning-with-okta
SCIM (System for Cross-domain Identity Management) is an open standard protocol (RFC 7644) that automates the exchange of user identity information be...
implementing-ics-firewall-with-tofino
When deploying zone-level firewall protection directly in front of critical PLCs or RTUs When requiring deep packet inspection of industrial protocols...
implementing-identity-verification-for-zero-trust
Understanding of zero trust principles (NIST SP 800-207) Familiarity with identity providers (Azure AD, Okta, Ping Identity) Knowledge of authenticati...
implementing-log-forwarding-with-fluentd
This skill covers configuring Fluentd and Fluent Bit for centralized log collection, routing, and enrichment. Fluent Bit acts as a lightweight log for...
implementing-network-intrusion-prevention-with-suricata
Suricata is a high-performance, open-source network threat detection engine developed by the Open Information Security Foundation (OISF). It functions...
implementing-data-loss-prevention-with-microsoft-purview
Deploying DLP policies to prevent sensitive data (PII, PHI, PCI, intellectual property) from leaving the organization through email, cloud storage, ch...
implementing-dragos-platform-for-ot-monitoring
When deploying an OT-specific network detection and response (NDR) solution for industrial environments When needing threat intelligence-driven detect...
hunting-credential-stuffing-attacks
When investigating security incidents that require hunting credential stuffing attacks When building detection rules or threat hunting queries for thi...
implementing-gcp-binary-authorization
Binary Authorization is a Google Cloud deploy-time security control that ensures only trusted container images are deployed on GKE or Cloud Run. It wo...
implementing-api-security-testing-with-42crunch
42Crunch is an API security platform that combines Shift-Left security testing with Shield-Right runtime protection. It provides API Audit for static ...
implementing-aws-security-hub-compliance
When establishing centralized security posture management across multiple AWS accounts When compliance requirements demand continuous monitoring again...
exploiting-http-request-smuggling
During authorized penetration tests when the application sits behind a reverse proxy, load balancer, or CDN When testing infrastructure with multiple ...