Browse Skills
Implementing Syslog Centralization With Rsyslog
v1.0.0>-
Implementing Threat Intelligence Lifecycle Management
v1.0.0Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis, dissemination, and feedback stages to produce actionable intelligence for organizational decision-making.
Implementing Threat Intelligence Platform
v1.0.0>-
Implementing Ticketing System For Incidents
v1.0.0>
Implementing Usb Device Control Policy
v1.0.0>
Implementing Vulnerability Remediation Sla
v1.0.0Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality, and exploit availability. Effective SLA programs
Implementing Vulnerability Sla Breach Alerting
v1.0.0Build automated alerting for vulnerability remediation SLA breaches with severity-based timelines, escalation workflows, and compliance reporting dashboards.
Implementing Web Application Logging With Modsecurity
v1.0.0>
Implementing Zero Knowledge Proof For Authentication
v1.0.0Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private key) without revealing the secret itself. This skill implements the Schnorr identificati
Implementing Zero Trust Dns With Nextdns
v1.0.0Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking, privacy protection, and organizational policy enforcement across all endpoints.
Implementing Zero Trust For Saas Applications
v1.0.0>
Implementing Zero Trust In Cloud
v1.0.0>