Search Skills
Search across 54932 indexed skills
performing-soc-tabletop-exercise
Use this skill when: Annual or semi-annual incident response testing is required (NIST, ISO 27001, PCI DSS compliance) New SOC analysts need exposure ...
performing-adversary-in-the-middle-phishing-detection
Adversary-in-the-Middle (AiTM) phishing attacks use reverse-proxy infrastructure to sit between the victim and the legitimate authentication service, ...
implementing-epss-score-for-vulnerability-prioritization
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST (Forum of Incident Response and Security Teams) that estimates ...
implementing-network-traffic-analysis-with-arkime
When deploying or configuring implementing network traffic analysis with arkime capabilities in your environment When establishing security controls a...
implementing-attack-surface-management
When building an external attack surface management (EASM) program from scratch When performing authorized external reconnaissance for penetration tes...
performing-authenticated-scan-with-openvas
OpenVAS (Open Vulnerability Assessment Scanner) is the scanner component of the Greenbone Vulnerability Management (GVM) framework. Authenticated scan...
implementing-envelope-encryption-with-aws-kms
Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself is encrypted with a master key (KEK) ma...
implementing-device-posture-assessment-in-zero-trust
When enforcing device health as a prerequisite for accessing corporate applications When integrating CrowdStrike ZTA scores, Intune compliance, or Jam...
conducting-internal-reconnaissance-with-bloodhound-ce
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
exploiting-sql-injection-with-sqlmap
During authorized web application penetration testing engagements When manual testing reveals potential SQL injection points in parameters, headers, o...
building-incident-response-dashboard
Use this skill when: IR teams need real-time dashboards during active incidents for coordination and tracking SOC leadership requires operational dash...
performing-entitlement-review-with-sailpoint-iiq
Quarterly or annual access certification campaigns are required for compliance (SOX, HIPAA, PCI-DSS) Organization needs automated manager-based access...