Browse Skills

Implementing Security Information Sharing With Stix2

v1.0.0

>

mukul975
4

Implementing Security Chaos Engineering

v1.0.0

>

mukul975
4

Implementing Secrets Scanning In Ci Cd

v1.0.0

Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment

mukul975
3

Implementing Secrets Management With Vault

v1.0.0

>

mukul975
5

Implementing Secret Scanning With Gitleaks

v1.0.0

>

mukul975
4

Implementing Scim Provisioning With Okta

v1.0.0

Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.

mukul975
2

Implementing Saml Sso With Okta

v1.0.0

Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end configuration of SAML authentication flows, attribute mapping, certificate management, a

mukul975
2

Implementing Runtime Security With Tetragon

v1.0.0

Implement eBPF-based runtime security observability and enforcement in Kubernetes clusters using Cilium Tetragon for kernel-level threat detection and policy enforcement.

mukul975
5

Implementing Runtime Application Self Protection

v1.0.0

Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application runtime, covering OpenRASP integration, attack pattern detection, and security policy configuration for Java and Python web applications.

mukul975
4

Implementing Rsa Key Pair Management

v1.0.0

RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital signatures, key exchange, and encryption. This skill covers generating, storing, rotating,

mukul975
5

Implementing Rbac Hardening For Kubernetes

v1.0.0

Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings, eliminating cluster-admin sprawl, and integrating external identity providers.

mukul975
3

Implementing Rbac For Kubernetes Cluster

v1.0.0

Configure Kubernetes Role-Based Access Control (RBAC) to enforce least-privilege access to cluster resources. This skill covers Role/ClusterRole design, RoleBinding configuration, service account secu

mukul975
3