Browse Skills

Implementing Iec 62443 Security Zones

v1.0.0

>

mukul975
3

Implementing Image Provenance Verification With Cosign

v1.0.0

Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations, and Kubernetes admission enforcement.

mukul975
3

Implementing Infrastructure As Code Security Scanning

v1.0.0

>

mukul975
4

Implementing Iso 27001 Information Security Management

v1.0.0

ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete

mukul975
2

Implementing Kubernetes Network Policy With Calico

v1.0.0

Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.

mukul975
4

Implementing Kubernetes Pod Security Standards

v1.0.0

Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admission (PSA) controller built into Kubernetes 1.25+. PS

mukul975
5

Implementing Mimecast Targeted Attack Protection

v1.0.0

Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.

mukul975
4

Implementing Mitre Attack Coverage Mapping

v1.0.0

Implement MITRE ATT&CK coverage mapping to identify detection gaps, prioritize rule development, and measure SOC detection maturity against adversary techniques.

mukul975
3

Implementing Network Access Control With Cisco Ise

v1.0.0

Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass, posture assessment, and dynamic VLAN assignment for network access control.

mukul975
6

Implementing Network Deception With Honeypots

v1.0.0

Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral movement, and attacker reconnaissance.

mukul975
4

Implementing Network Intrusion Prevention With Suricata

v1.0.0

Deploy and configure Suricata as a network intrusion prevention system with custom rules, Emerging Threats rulesets, and inline traffic inspection for real-time threat blocking.

mukul975
2

Implementing Network Policies For Kubernetes

v1.0.0

Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control traffic flow between pods, namespaces, and external endpoints. Combined with CNI plu

mukul975
3