Browse Skills

Implementing Purdue Model Network Segmentation

v1.0.0

>

mukul975
4

Implementing Ransomware Backup Strategy

v1.0.0

>

mukul975
4

Implementing Rsa Key Pair Management

v1.0.0

RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital signatures, key exchange, and encryption. This skill covers generating, storing, rotating,

mukul975
5

Implementing Saml Sso With Okta

v1.0.0

Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end configuration of SAML authentication flows, attribute mapping, certificate management, a

mukul975
2

Implementing Scim Provisioning With Okta

v1.0.0

Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.

mukul975
2

Implementing Secret Scanning With Gitleaks

v1.0.0

>

mukul975
4

Implementing Secrets Management With Vault

v1.0.0

>

mukul975
5

Implementing Siem Correlation Rules For Apt

v1.0.0

>-

mukul975
4

Implementing Siem Use Case Tuning

v1.0.0

Tune SIEM detection rules to reduce false positives by analyzing alert volumes, creating whitelists, adjusting thresholds, and measuring detection efficacy metrics in Splunk and Elastic

mukul975
3

Implementing Siem Use Cases For Detection

v1.0.0

>

mukul975
3

Implementing Soar Automation With Phantom

v1.0.0

>

mukul975
3

Implementing Stix Taxii Feed Integration

v1.0.0

STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Intelligence Information) are OASIS open standards for representing and transporting cyber threat intelligence.

mukul975
4