Browse Skills

Hunting For Registry Run Key Persistence

v1.0.0

Detect MITRE ATT&CK T1547.001 registry Run key persistence by analyzing Sysmon Event ID 13 logs and registry queries to identify malicious auto-start entries.

mukul975
4

Hunting For T1098 Account Manipulation

v1.0.0

Hunt for MITRE ATT&CK T1098 account manipulation including shadow admin creation, SID history injection, group membership changes, and credential modifications using Windows Security Event Logs.

mukul975
3

Hunting For Unusual Service Installations

v1.0.0

Detect suspicious Windows service installations (MITRE ATT&CK T1543.003) by parsing System event logs for Event ID 7045, analyzing service binary paths, and identifying indicators of persistence mechanisms.

mukul975
5

Implementing Anti Phishing Training Program

v1.0.0

Security awareness training is the human layer of phishing defense. An effective anti-phishing training program combines regular simulations, interactive learning modules, metric tracking, and positiv

mukul975
3

Configuring Hsm For Key Storage

v1.0.0

Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea

mukul975
3

Configuring Ldap Security Hardening

v1.0.0

Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. Covers LDAPS enforcement, channel binding, LDAP si

mukul975
3

Configuring Multi Factor Authentication With Duo

v1.0.0

Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust

mukul975
4

Configuring Tls 1 3 For Secure Communications

v1.0.0

TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements over TLS 1.2 in both security and performance. It reduces handshake latency to 1-R

mukul975
3

Containing Active Security Breach

v1.0.0

Rapidly contain an active security breach by isolating compromised systems, blocking attacker communications, and preserving evidence while minimizing business disruption.

mukul975
3

Correlating Security Events In Qradar

v1.0.0

>

mukul975
2

Deploying Tailscale For Zero Trust Vpn

v1.0.0

Deploy and configure Tailscale as a WireGuard-based zero trust mesh VPN with identity-aware access controls, ACLs, and exit nodes for secure peer-to-peer connectivity.

mukul975
5

Detecting Aws Guardduty Findings Automation

v1.0.0

Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time incident response, automatic quarantine of compromised resources, and security notification workflows.

mukul975
3