Browse Skills

Implementing Syslog Centralization With Rsyslog

v1.0.0

>-

mukul975
3

Implementing Threat Intelligence Lifecycle Management

v1.0.0

Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis, dissemination, and feedback stages to produce actionable intelligence for organizational decision-making.

mukul975
3

Implementing Threat Intelligence Platform

v1.0.0

>-

mukul975
6

Implementing Ticketing System For Incidents

v1.0.0

>

mukul975
3

Implementing Usb Device Control Policy

v1.0.0

>

mukul975
3

Implementing Vulnerability Remediation Sla

v1.0.0

Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality, and exploit availability. Effective SLA programs

mukul975
3

Implementing Vulnerability Sla Breach Alerting

v1.0.0

Build automated alerting for vulnerability remediation SLA breaches with severity-based timelines, escalation workflows, and compliance reporting dashboards.

mukul975
3

Implementing Web Application Logging With Modsecurity

v1.0.0

>

mukul975
6

Implementing Zero Knowledge Proof For Authentication

v1.0.0

Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private key) without revealing the secret itself. This skill implements the Schnorr identificati

mukul975
4

Implementing Zero Trust Dns With Nextdns

v1.0.0

Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking, privacy protection, and organizational policy enforcement across all endpoints.

mukul975
3

Implementing Zero Trust For Saas Applications

v1.0.0

>

mukul975
4

Implementing Zero Trust In Cloud

v1.0.0

>

mukul975
2