Search Skills
Search across 54932 indexed skills
performing-hash-cracking-with-hashcat
Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength. Hashcat is the world's fastest passwo...
performing-cloud-asset-inventory-with-cartography
Cartography is a CNCF sandbox project (originally created at Lyft) that consolidates infrastructure assets and their relationships into a Neo4j graph ...
performing-android-app-static-analysis-with-mobsf
Use this skill when: Conducting security assessment of Android APK or AAB files before production release Integrating automated mobile security scanni...
analyzing-network-traffic-for-incidents
SIEM alerts on anomalous network traffic patterns requiring deeper investigation C2 beaconing is suspected and needs confirmation through packet-level...
conducting-mobile-app-penetration-test
Testing mobile applications before release to identify security vulnerabilities and data protection issues Conducting compliance assessments against O...
conducting-wireless-network-penetration-test
Assessing the security of enterprise wireless networks including guest, corporate, and IoT WiFi segments Testing whether attackers within physical pro...
building-threat-intelligence-enrichment-in-splunk
Splunk's Threat Intelligence Framework in Enterprise Security enables SOC teams to automatically correlate indicators of compromise (IOCs) against sec...
building-cloud-siem-with-sentinel
When establishing a centralized security operations center for multi-cloud environments When migrating from legacy SIEM platforms (Splunk, QRadar) to ...
implementing-cloud-workload-protection
When deploying or configuring implementing cloud workload protection capabilities in your environment When establishing security controls aligned to c...
mapping-mitre-attack-techniques
Use this skill when: Generating an ATT&CK coverage heatmap to show which techniques your detection stack addresses Tagging existing SIEM use cases or ...
configuring-tls-1-3-for-secure-communications
TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements over TLS 1.2 in both security an...
scanning-infrastructure-with-nessus
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network infrastructure including servers, wor...