Found 699 skills for "mukul975" Page 37 of 59

conducting-cloud-incident-response

Cloud security posture management (CSPM) alerts on unauthorized resource changes CloudTrail, Azure Activity Logs, or GCP Audit Logs show suspicious AP...

github 4 files

configuring-zscaler-private-access-for-ztna

When replacing traditional VPN concentrators with application-level zero trust access When providing remote users secure access to internal applicatio...

github 8 files

implementing-cloud-waf-rules

When deploying new web applications or APIs behind cloud load balancers requiring OWASP protection When application penetration testing reveals SQL in...

github 4 files

building-role-mining-for-rbac-optimization

Role mining is the process of analyzing existing user-permission assignments to discover optimal roles for a Role-Based Access Control (RBAC) system. ...

github 8 files

conducting-social-engineering-pretext-call

A pretext call (vishing) is a social engineering technique where an attacker impersonates a trusted authority figure over the phone to manipulate targ...

github 8 files

conducting-spearphishing-simulation-campaign

Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...

github 8 files

conducting-wireless-network-penetration-test

Assessing the security of enterprise wireless networks including guest, corporate, and IoT WiFi segments Testing whether attackers within physical pro...

github 4 files

configuring-aws-verified-access-for-ztna

AWS Verified Access is a Zero Trust Network Access (ZTNA) service that provides secure, VPN-less access to corporate applications hosted in AWS. It ev...

github 8 files

building-soc-playbook-for-ransomware

Use this skill when: SOC teams need a standardized ransomware response playbook for Tier 1-3 analysts An organization lacks documented procedures for ...

github 4 files

configuring-ldap-security-hardening

Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. ...

github 4 files

building-threat-hunt-hypothesis-framework

When proactively hunting for indicators of building threat hunt hypothesis framework in the environment After threat intelligence indicates active cam...

github 8 files

building-threat-intelligence-enrichment-in-splunk

Splunk's Threat Intelligence Framework in Enterprise Security enables SOC teams to automatically correlate indicators of compromise (IOCs) against sec...

github 8 files