Browse Skills
Implementing Azure Defender For Cloud
v1.0.0>
Implementing Azure Ad Privileged Identity Management
v1.0.0Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows, and access reviews for Azure AD privileged roles.
Implementing Aws Security Hub Compliance
v1.0.0>
Implementing Aws Security Hub
v1.0.0>
Implementing Aws Macie For Data Classification
v1.0.0Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine learning and pattern matching for PII, financial data, and credentials detection.
Implementing Aws Iam Permission Boundaries
v1.0.0Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege limits set by the security team.
Implementing Aws Config Rules For Compliance
v1.0.0>
Implementing Attack Path Analysis With Xm Cyber
v1.0.0Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize the 2% of exposures that threaten critical assets.
Implementing Aqua Security For Container Scanning
v1.0.0Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues in container images across CI/CD pipelines and registries.
Implementing Application Whitelisting With Applocker
v1.0.0>
Implementing Api Threat Protection With Apigee
v1.0.0Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0, SpikeArrest, and Advanced API Security for OWASP Top 10 defense.
Implementing Api Security Testing With 42crunch
v1.0.0Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic conformance scanning of OpenAPI specifications.