Found 1000 skills for "security" Page 70 of 84

implementing-gcp-organization-policy-constraints

The GCP Organization Policy Service provides centralized and programmatic control over cloud resources. Organization policies configure constraints th...

github 8 files

performing-kubernetes-penetration-testing

Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods...

github 8 files

implementing-gcp-binary-authorization

Binary Authorization is a Google Cloud deploy-time security control that ensures only trusted container images are deployed on GKE or Cloud Run. It wo...

github 8 files

detecting-ntlm-relay-with-event-correlation

Authorized Testing Disclaimer: The offensive techniques and attack simulations described in this skill are intended exclusively for authorized penetra...

github 6 files

detecting-network-anomalies-with-zeek

Deploying passive network security monitoring at key network choke points for continuous visibility Generating structured connection, DNS, HTTP, SSL, ...

github 4 files

implementing-passwordless-authentication-with-fido2

Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server confi...

github 6 files

performing-kubernetes-cis-benchmark-with-kube-bench

kube-bench is an open-source Go tool by Aqua Security that runs the CIS Kubernetes Benchmark checks. It verifies control plane, etcd, worker node, and...

github 8 files

implementing-cloud-trail-log-analysis

When building security monitoring pipelines for AWS API activity When investigating security incidents to trace attacker actions across AWS services W...

github 4 files

auditing-cloud-with-cis-benchmarks

When performing initial security audits of cloud environments against industry-standard benchmarks When preparing for SOC 2, ISO 27001, or regulatory ...

github 4 files

detecting-bluetooth-low-energy-attacks

This skill is intended for authorized security testing, penetration testing engagements, CTF competitions, and educational purposes only. Sniffing, in...

github 4 files

detecting-rdp-brute-force-attacks

RDP brute force attacks target Windows Remote Desktop Protocol services by attempting rapid credential guessing against exposed RDP endpoints. Detecti...

github 4 files

implementing-network-segmentation-with-firewall-zones

Network segmentation divides a flat network into isolated security zones with firewall-enforced boundaries to contain breaches, restrict lateral movem...

github 4 files