Browse Skills

Configuring Suricata For Network Monitoring

v1.0.0

>

mukul975
5

Configuring Snort Ids For Intrusion Detection

v1.0.0

>

mukul975
3

Configuring Pfsense Firewall Rules

v1.0.0

>

mukul975
2

Configuring Oauth2 Authorization Flow

v1.0.0

Configure secure OAuth 2.0 authorization flows including Authorization Code with PKCE, Client Credentials, and Device Authorization Grant. This skill covers flow selection, PKCE implementation, token

mukul975
4

Configuring Network Segmentation With Vlans

v1.0.0

>

mukul975
3

Configuring Multi Factor Authentication With Duo

v1.0.0

Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust

mukul975
4

Configuring Microsegmentation For Zero Trust

v1.0.0

Configuring Microsegmentation For Zero Trust

mukul975
3

Configuring Ldap Security Hardening

v1.0.0

Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. Covers LDAPS enforcement, channel binding, LDAP si

mukul975
3

Configuring Identity Aware Proxy With Google Iap

v1.0.0

>

mukul975
3

Configuring Hsm For Key Storage

v1.0.0

Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea

mukul975
3

Configuring Host Based Intrusion Detection

v1.0.0

>

mukul975
3

Configuring Certificate Authority With Openssl

v1.0.0

A Certificate Authority (CA) is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking digital certificates. This skill covers building a two-tier CA hierarchy (Root CA +

mukul975
3