Browse Skills
Implementing Network Segmentation With Firewall Zones
v1.0.0Design and implement network segmentation using firewall security zones, VLANs, ACLs, and microsegmentation policies to restrict lateral movement and enforce least-privilege network access.
Implementing Next Generation Firewall With Palo Alto
v1.0.0Configure and deploy Palo Alto Networks next-generation firewalls with App-ID, User-ID, zone-based policies, SSL decryption, and threat prevention profiles for enterprise network security.
Implementing Opa Gatekeeper For Policy Enforcement
v1.0.0Enforce Kubernetes admission policies using OPA Gatekeeper with ConstraintTemplates, Rego rules, and the Gatekeeper policy library.
Implementing Ot Incident Response Playbook
v1.0.0>
Implementing Pam For Database Access
v1.0.0Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL. Covers session proxy configuration, credential vaulting, query auditing, dynamic credentia
Implementing Passwordless Authentication With Fido2
v1.0.0Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server configuration, passkey enrollment, biometric authentica
Implementing Patch Management Workflow
v1.0.0Patch management is the systematic process of identifying, testing, deploying, and verifying software updates to remediate vulnerabilities across an organization's IT infrastructure. An effective patc
Implementing Pod Security Admission Controller
v1.0.0Implement Kubernetes Pod Security Admission to enforce baseline and restricted security profiles at namespace level using built-in admission controller.
Implementing Privileged Access Management With Cyberark
v1.0.0Deploy CyberArk Privileged Access Management to discover, vault, rotate, and monitor privileged credentials across enterprise infrastructure. This skill covers vault architecture, session isolation, c
Implementing Proofpoint Email Security Gateway
v1.0.0Deploy and configure Proofpoint Email Protection as a secure email gateway to detect and block phishing, malware, BEC, and spam before messages reach user inboxes.
Implementing Rapid7 Insightvm For Scanning
v1.0.0Deploy and configure Rapid7 InsightVM Security Console and Scan Engines for authenticated and unauthenticated vulnerability scanning across enterprise environments.
Implementing Rbac For Kubernetes Cluster
v1.0.0Configure Kubernetes Role-Based Access Control (RBAC) to enforce least-privilege access to cluster resources. This skill covers Role/ClusterRole design, RoleBinding configuration, service account secu