Browse Skills
Implementing Network Segmentation For Ot
v1.0.0>
Implementing Network Policies For Kubernetes
v1.0.0Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control traffic flow between pods, namespaces, and external endpoints. Combined with CNI plu
Implementing Network Intrusion Prevention With Suricata
v1.0.0Deploy and configure Suricata as a network intrusion prevention system with custom rules, Emerging Threats rulesets, and inline traffic inspection for real-time threat blocking.
Implementing Network Deception With Honeypots
v1.0.0Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral movement, and attacker reconnaissance.
Implementing Network Access Control With Cisco Ise
v1.0.0Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass, posture assessment, and dynamic VLAN assignment for network access control.
Implementing Network Access Control
v1.0.0>
Implementing Nerc Cip Compliance Controls
v1.0.0>
Implementing Mtls For Zero Trust Services
v1.0.0>
Implementing Mobile Application Management
v1.0.0>
Implementing Mitre Attack Coverage Mapping
v1.0.0Implement MITRE ATT&CK coverage mapping to identify detection gaps, prioritize rule development, and measure SOC detection maturity against adversary techniques.
Implementing Mimecast Targeted Attack Protection
v1.0.0Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.
Implementing Microsegmentation With Guardicore
v1.0.0>