Browse Skills
Investigating Phishing Email Incident
v1.0.0>
mukul975
3
Investigating Insider Threat Indicators
v1.0.0>
mukul975
6
Intercepting Mobile Traffic With Burpsuite
v1.0.0>
mukul975
3
Integrating Sast Into Github Actions Pipeline
v1.0.0>
mukul975
3
Integrating Dast With Owasp Zap In Pipeline
v1.0.0>
mukul975
2
Implementing Zero Trust With Hashicorp Boundary
v1.0.0Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential brokering, session recording, and Vault integration.
mukul975
5
Implementing Zero Trust With Beyondcorp
v1.0.0Deploy Google BeyondCorp Enterprise zero trust access controls using Identity-Aware Proxy (IAP), context-aware access policies, device trust validation, and Access Context Manager to enforce identity and posture-based access to GCP resources and internal applications.
mukul975
3
Implementing Zero Trust Network Access With Zscaler
v1.0.0Implementing Zero Trust Network Access With Zscaler
mukul975
4
Implementing Zero Trust Network Access
v1.0.0>
mukul975
3
Implementing Zero Trust In Cloud
v1.0.0>
mukul975
2
Implementing Zero Trust For Saas Applications
v1.0.0>
mukul975
4
Implementing Zero Trust Dns With Nextdns
v1.0.0Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking, privacy protection, and organizational policy enforcement across all endpoints.
mukul975
3