Browse Skills
Configuring Suricata For Network Monitoring
v1.0.0>
Configuring Snort Ids For Intrusion Detection
v1.0.0>
Configuring Pfsense Firewall Rules
v1.0.0>
Configuring Oauth2 Authorization Flow
v1.0.0Configure secure OAuth 2.0 authorization flows including Authorization Code with PKCE, Client Credentials, and Device Authorization Grant. This skill covers flow selection, PKCE implementation, token
Configuring Network Segmentation With Vlans
v1.0.0>
Configuring Multi Factor Authentication With Duo
v1.0.0Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust
Configuring Microsegmentation For Zero Trust
v1.0.0Configuring Microsegmentation For Zero Trust
Configuring Ldap Security Hardening
v1.0.0Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. Covers LDAPS enforcement, channel binding, LDAP si
Configuring Identity Aware Proxy With Google Iap
v1.0.0>
Configuring Hsm For Key Storage
v1.0.0Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea
Configuring Host Based Intrusion Detection
v1.0.0>
Configuring Certificate Authority With Openssl
v1.0.0A Certificate Authority (CA) is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking digital certificates. This skill covers building a two-tier CA hierarchy (Root CA +