Browse Skills

Implementing Zero Trust Network Access

v1.0.0

>

mukul975
3

Implementing Zero Trust Network Access With Zscaler

v1.0.0

Implementing Zero Trust Network Access With Zscaler

mukul975
4

Implementing Zero Trust With Hashicorp Boundary

v1.0.0

Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential brokering, session recording, and Vault integration.

mukul975
6

Investigating Insider Threat Indicators

v1.0.0

>

mukul975
6

Managing Cloud Identity With Okta

v1.0.0

>

mukul975
2

Managing Intelligence Lifecycle

v1.0.0

>

mukul975
3

Monitoring Darkweb Sources

v1.0.0

>

mukul975
3

Performing Access Recertification With Saviynt

v1.0.0

Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.

mukul975
3

Performing Active Directory Compromise Investigation

v1.0.0

Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.

mukul975
5

Performing Adversary In The Middle Phishing Detection

v1.0.0

Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy, Evilginx, and Tycoon 2FA to bypass MFA and steal session tokens.

mukul975
3

Performing Android App Static Analysis With Mobsf

v1.0.0

>

mukul975
4

Performing Asset Criticality Scoring For Vulns

v1.0.0

Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.

mukul975
4