Search Skills
Search across 54932 indexed skills
scanning-kubernetes-manifests-with-kubesec
Kubesec is an open-source security risk analysis tool developed by ControlPlane that inspects Kubernetes resource manifests for common exploitable ris...
code-review
When reviewing code: Read the full diff or file provided Check for security vulnerabilities (OWASP Top 10) Evaluate error handling completeness Assess...
performing-network-traffic-analysis-with-zeek
Zeek (formerly Bro) is an open-source network analysis framework that operates as a passive network security monitor. Unlike traditional signature-bas...
performing-gcp-penetration-testing-with-gcpbucketbrute
This skill covers Google Cloud Platform security testing using GCPBucketBrute for storage bucket enumeration and access permission testing, combined w...
performing-aws-account-enumeration-with-scout-suite
ScoutSuite is an open-source multi-cloud security auditing tool developed by NCC Group that enables comprehensive security posture assessment of AWS e...
implementing-cloud-vulnerability-posture-management
Cloud Security Posture Management (CSPM) continuously monitors cloud infrastructure for misconfigurations, compliance violations, and security risks. ...
performing-active-directory-vulnerability-assessment
Active Directory (AD) is the primary identity and access management system in most enterprise environments, making it a critical attack target. This s...
detecting-cryptomining-in-cloud
When cloud billing alerts indicate unexpected compute cost spikes When GuardDuty generates CryptoCurrency or Impact finding types When investigating c...
securing-azure-with-microsoft-defender
When deploying cloud workload protection across Azure subscriptions and resource groups When establishing a Secure Score baseline and prioritizing sec...
configuring-hsm-for-key-storage
Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a har...
conducting-cloud-incident-response
Cloud security posture management (CSPM) alerts on unauthorized resource changes CloudTrail, Azure Activity Logs, or GCP Audit Logs show suspicious AP...
configuring-active-directory-tiered-model
Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory. Covers Tier 0/1/2 separation, privi...