Browse Skills
Implementing Zero Standing Privilege With Cyberark
v1.0.0Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using just-in-time access with time, entitlement, and approval controls.
Implementing Zero Knowledge Proof For Authentication
v1.0.0Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private key) without revealing the secret itself. This skill implements the Schnorr identificati
Implementing Web Application Logging With Modsecurity
v1.0.0>
Implementing Vulnerability Sla Breach Alerting
v1.0.0Build automated alerting for vulnerability remediation SLA breaches with severity-based timelines, escalation workflows, and compliance reporting dashboards.
Implementing Vulnerability Remediation Sla
v1.0.0Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality, and exploit availability. Effective SLA programs
Implementing Vulnerability Management With Greenbone
v1.0.0Deploy and operate Greenbone/OpenVAS vulnerability management using the python-gvm library to create scan targets, execute vulnerability scans, and parse scan reports via GMP protocol.
Implementing Velociraptor For Ir Collection
v1.0.0Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response using VQL queries, hunts, and pre-built artifact packs across Windows, Linux, and macOS environments.
Implementing Usb Device Control Policy
v1.0.0>
Implementing Ticketing System For Incidents
v1.0.0>
Implementing Threat Modeling With Mitre Attack
v1.0.0>
Implementing Threat Intelligence Platform
v1.0.0>-
Implementing Threat Intelligence Lifecycle Management
v1.0.0Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis, dissemination, and feedback stages to produce actionable intelligence for organizational decision-making.