Browse Skills
Implementing Zero Trust Network Access
v1.0.0>
Implementing Zero Trust Network Access With Zscaler
v1.0.0Implementing Zero Trust Network Access With Zscaler
Implementing Zero Trust With Hashicorp Boundary
v1.0.0Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential brokering, session recording, and Vault integration.
Investigating Insider Threat Indicators
v1.0.0>
Managing Cloud Identity With Okta
v1.0.0>
Managing Intelligence Lifecycle
v1.0.0>
Monitoring Darkweb Sources
v1.0.0>
Performing Access Recertification With Saviynt
v1.0.0Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.
Performing Active Directory Compromise Investigation
v1.0.0Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.
Performing Adversary In The Middle Phishing Detection
v1.0.0Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy, Evilginx, and Tycoon 2FA to bypass MFA and steal session tokens.
Performing Android App Static Analysis With Mobsf
v1.0.0>
Performing Asset Criticality Scoring For Vulns
v1.0.0Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.