Browse Skills
Implementing Rapid7 Insightvm For Scanning
v1.0.0Deploy and configure Rapid7 InsightVM Security Console and Scan Engines for authenticated and unauthenticated vulnerability scanning across enterprise environments.
Implementing Ransomware Backup Strategy
v1.0.0>
Implementing Purdue Model Network Segmentation
v1.0.0>
Implementing Proofpoint Email Security Gateway
v1.0.0Deploy and configure Proofpoint Email Protection as a secure email gateway to detect and block phishing, malware, BEC, and spam before messages reach user inboxes.
Implementing Privileged Session Monitoring
v1.0.0>
Implementing Privileged Identity Management With Azure
v1.0.0Configure Azure AD Privileged Identity Management (PIM) using Microsoft Graph API to manage eligible role assignments, just-in-time activation, access reviews, and role management policies for zero-trust privileged access.
Implementing Privileged Access Workstation
v1.0.0Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration with CyberArk or BeyondTrust for secure administrative operations.
Implementing Privileged Access Management With Cyberark
v1.0.0Deploy CyberArk Privileged Access Management to discover, vault, rotate, and monitor privileged credentials across enterprise infrastructure. This skill covers vault architecture, session isolation, c
Implementing Policy As Code With Open Policy Agent
v1.0.0>
Implementing Pod Security Admission Controller
v1.0.0Implement Kubernetes Pod Security Admission to enforce baseline and restricted security profiles at namespace level using built-in admission controller.
Implementing Pci Dss Compliance Controls
v1.0.0PCI DSS 4.0.1 establishes 12 requirements across 6 control objectives for organizations that store, process, or transmit cardholder data. With PCI DSS 3.2.1 retiring April 2024 and 51 new requirements
Implementing Patch Management Workflow
v1.0.0Patch management is the systematic process of identifying, testing, deploying, and verifying software updates to remediate vulnerabilities across an organization's IT infrastructure. An effective patc