Browse Skills
Implementing Purdue Model Network Segmentation
v1.0.0>
Implementing Ransomware Backup Strategy
v1.0.0>
Implementing Rsa Key Pair Management
v1.0.0RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital signatures, key exchange, and encryption. This skill covers generating, storing, rotating,
Implementing Saml Sso With Okta
v1.0.0Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end configuration of SAML authentication flows, attribute mapping, certificate management, a
Implementing Scim Provisioning With Okta
v1.0.0Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.
Implementing Secret Scanning With Gitleaks
v1.0.0>
Implementing Secrets Management With Vault
v1.0.0>
Implementing Siem Correlation Rules For Apt
v1.0.0>-
Implementing Siem Use Case Tuning
v1.0.0Tune SIEM detection rules to reduce false positives by analyzing alert volumes, creating whitelists, adjusting thresholds, and measuring detection efficacy metrics in Splunk and Elastic
Implementing Siem Use Cases For Detection
v1.0.0>
Implementing Soar Automation With Phantom
v1.0.0>
Implementing Stix Taxii Feed Integration
v1.0.0STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Intelligence Information) are OASIS open standards for representing and transporting cyber threat intelligence.