Search Skills
Search across 54932 indexed skills
performing-active-directory-bloodhound-analysis
BloodHound is an open-source Active Directory reconnaissance tool that uses graph theory to reveal hidden relationships, attack paths, and privilege e...
implementing-zero-trust-network-access
When replacing traditional VPN-based remote access with identity-based access controls When implementing micro-segmentation to limit lateral movement ...
managing-cloud-identity-with-okta
When centralizing authentication across AWS, Azure, and GCP console access through a single identity provider When implementing phishing-resistant MFA...
implementing-proofpoint-email-security-gateway
Proofpoint Email Protection is a cloud-native secure email gateway (SEG) that acts as a security checkpoint where all inbound and outbound mail traffi...
investigating-insider-threat-indicators
Use this skill when: HR refers a departing employee for monitoring during their notice period DLP alerts indicate bulk data downloads or transfers to ...
implementing-siem-use-cases-for-detection
Use this skill when: SOC teams need to build or expand their SIEM detection library from scratch Threat assessments identify ATT&CK technique gaps req...
implementing-threat-modeling-with-mitre-attack
Use this skill when: SOC teams need to assess detection coverage against relevant threat actors and their TTPs Security leadership requires threat-inf...
implementing-rsa-key-pair-management
RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital signatures, key exchange, and encryption....
implementing-immutable-backup-with-restic
Establishing ransomware-resistant backup infrastructure with cryptographic integrity verification Implementing 3-2-1-1-0 backup strategy where the ext...
implementing-network-policies-for-kubernetes
Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control traffic flow between pods, namespa...
implementing-network-traffic-baselining
Network traffic baselining establishes normal communication patterns by analyzing historical NetFlow/IPFIX data to create statistical profiles of expe...
implementing-next-generation-firewall-with-palo-alto
Palo Alto Networks Next-Generation Firewalls (NGFWs) move beyond traditional port-based rule enforcement to application-aware, identity-driven securit...