Browse Skills
Implementing Conduit Security For Ot Remote Access
v1.0.0>
Implementing Conditional Access Policies Azure Ad
v1.0.0Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device compliance requirements, risk-based authentication, named l
Implementing Code Signing For Artifacts
v1.0.0>
Implementing Cloud Workload Protection
v1.0.0>
Implementing Cloud Waf Rules
v1.0.0>
Implementing Cloud Vulnerability Posture Management
v1.0.0Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source tools like Prowler and ScoutSuite for multi-cloud vulnerability detection.
Implementing Cloud Trail Log Analysis
v1.0.0>
Implementing Cloud Security Posture Management
v1.0.0>
Implementing Cloud Dlp For Data Protection
v1.0.0>
Implementing Cisa Zero Trust Maturity Model
v1.0.0Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications, and data to achieve progressive organizational zero trust maturity.
Implementing Bgp Security With Rpki
v1.0.0Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and ROV policies on Cisco and Juniper routers to prevent route hijacking.
Implementing Beyondcorp Zero Trust Access Model
v1.0.0>