Browse Skills
Implementing Iec 62443 Security Zones
v1.0.0>
Implementing Image Provenance Verification With Cosign
v1.0.0Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations, and Kubernetes admission enforcement.
Implementing Infrastructure As Code Security Scanning
v1.0.0>
Implementing Iso 27001 Information Security Management
v1.0.0ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete
Implementing Kubernetes Network Policy With Calico
v1.0.0Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.
Implementing Kubernetes Pod Security Standards
v1.0.0Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admission (PSA) controller built into Kubernetes 1.25+. PS
Implementing Mimecast Targeted Attack Protection
v1.0.0Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.
Implementing Mitre Attack Coverage Mapping
v1.0.0Implement MITRE ATT&CK coverage mapping to identify detection gaps, prioritize rule development, and measure SOC detection maturity against adversary techniques.
Implementing Network Access Control With Cisco Ise
v1.0.0Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass, posture assessment, and dynamic VLAN assignment for network access control.
Implementing Network Deception With Honeypots
v1.0.0Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral movement, and attacker reconnaissance.
Implementing Network Intrusion Prevention With Suricata
v1.0.0Deploy and configure Suricata as a network intrusion prevention system with custom rules, Emerging Threats rulesets, and inline traffic inspection for real-time threat blocking.
Implementing Network Policies For Kubernetes
v1.0.0Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control traffic flow between pods, namespaces, and external endpoints. Combined with CNI plu