Search Skills
Search across 54932 indexed skills
conducting-cloud-incident-response
Cloud security posture management (CSPM) alerts on unauthorized resource changes CloudTrail, Azure Activity Logs, or GCP Audit Logs show suspicious AP...
configuring-zscaler-private-access-for-ztna
When replacing traditional VPN concentrators with application-level zero trust access When providing remote users secure access to internal applicatio...
implementing-cloud-waf-rules
When deploying new web applications or APIs behind cloud load balancers requiring OWASP protection When application penetration testing reveals SQL in...
building-role-mining-for-rbac-optimization
Role mining is the process of analyzing existing user-permission assignments to discover optimal roles for a Role-Based Access Control (RBAC) system. ...
conducting-social-engineering-pretext-call
A pretext call (vishing) is a social engineering technique where an attacker impersonates a trusted authority figure over the phone to manipulate targ...
conducting-spearphishing-simulation-campaign
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
conducting-wireless-network-penetration-test
Assessing the security of enterprise wireless networks including guest, corporate, and IoT WiFi segments Testing whether attackers within physical pro...
configuring-aws-verified-access-for-ztna
AWS Verified Access is a Zero Trust Network Access (ZTNA) service that provides secure, VPN-less access to corporate applications hosted in AWS. It ev...
building-soc-playbook-for-ransomware
Use this skill when: SOC teams need a standardized ransomware response playbook for Tier 1-3 analysts An organization lacks documented procedures for ...
configuring-ldap-security-hardening
Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. ...
building-threat-hunt-hypothesis-framework
When proactively hunting for indicators of building threat hunt hypothesis framework in the environment After threat intelligence indicates active cam...
building-threat-intelligence-enrichment-in-splunk
Splunk's Threat Intelligence Framework in Enterprise Security enables SOC teams to automatically correlate indicators of compromise (IOCs) against sec...