Browse Skills

Implementing Dmarc Dkim Spf Email Security

v1.0.0

SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate message integrity, and define policies for handling unauthenticated mail. Proper im

mukul975
2

Implementing Disk Encryption With Bitlocker

v1.0.0

>

mukul975
5

Implementing Digital Signatures With Ed25519

v1.0.0

Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit security with 64-byte signatures and 32-byte keys, offering significant advantages ove

mukul975
3

Implementing Diamond Model Analysis

v1.0.0

The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining four core features: Adversary, Capability, Infrastructure, and Victim. This skill co

mukul975
4

Implementing Devsecops Security Scanning

v1.0.0

>

mukul975
3

Implementing Device Posture Assessment In Zero Trust

v1.0.0

>

mukul975
5

Implementing Delinea Secret Server For Pam

v1.0.0

>

mukul975
4

Implementing Deception Based Detection With Canarytoken

v1.0.0

Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug tokens, DNS tokens, document tokens, and AWS key tokens.

mukul975
3

Implementing Ddos Mitigation With Cloudflare

v1.0.0

Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin protection to mitigate volumetric, protocol, and application-layer attacks.

mukul975
3

Implementing Continuous Security Validation With Bas

v1.0.0

Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating real-world attack techniques across the kill chain.

mukul975
3

Implementing Container Network Policies With Calico

v1.0.0

Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control pod-to-pod traffic, restrict egress, and implement zero-trust microsegmentation.

mukul975
3

Implementing Container Image Minimal Base With Distroless

v1.0.0

Reduce container attack surface by building application images on Google distroless base images that contain only the application runtime with no shell, package manager, or unnecessary OS utilities.

mukul975
2