mukul975/anthropic-cybersecurity-skills
Skill
Installs
acquiring-disk-image-with-dd-and-dcfldd
119
analyzing-api-gateway-access-logs
103
analyzing-android-malware-with-apktool
99
analyzing-cyber-kill-chain
90
analyzing-email-headers-for-phishing-investigation
83
analyzing-active-directory-acl-abuse
83
analyzing-browser-forensics-with-hindsight
83
conducting-api-security-testing
81
analyzing-cloud-storage-access-patterns
80
analyzing-command-and-control-communication
80
analyzing-network-traffic-with-wireshark
78
performing-web-application-penetration-test
77
analyzing-certificate-transparency-for-phishing
77
testing-for-xss-vulnerabilities
75
analyzing-apt-group-with-mitre-navigator
75
analyzing-docker-container-forensics
75
testing-api-security-with-owasp-top-10
74
analyzing-azure-activity-logs-for-threats
73
conducting-network-penetration-test
73
analyzing-dns-logs-for-exfiltration
73
analyzing-linux-audit-logs-for-intrusion
73
testing-jwt-token-security
72
analyzing-network-packets-with-scapy
70
analyzing-malicious-url-with-urlscan
68
analyzing-linux-kernel-rootkits
68
reverse-engineering-android-malware-with-jadx
67
analyzing-network-traffic-of-malware
66
conducting-external-reconnaissance-with-osint
66
analyzing-ios-app-security-with-objection
66
analyzing-bootkit-and-rootkit-samples
65
exploiting-sql-injection-vulnerabilities
65
analyzing-network-traffic-for-incidents
63
analyzing-indicators-of-compromise
62
analyzing-linux-elf-malware
62
analyzing-campaign-attribution-evidence
61
analyzing-kubernetes-audit-logs
60
analyzing-linux-system-artifacts
60
analyzing-ethereum-smart-contract-vulnerabilities
60
analyzing-disk-image-with-autopsy
59
testing-for-xxe-injection-vulnerabilities
58
testing-api-for-broken-object-level-authorization
58
analyzing-threat-intelligence-feeds
58
analyzing-network-flow-data-with-netflow
57
analyzing-network-covert-channels-in-malware
56
testing-for-sensitive-data-exposure
56
testing-for-xss-vulnerabilities-with-burpsuite
56
analyzing-malware-sandbox-evasion-techniques
56
testing-api-authentication-weaknesses
56
analyzing-cobalt-strike-beacon-configuration
55
analyzing-malicious-pdf-with-peepdf
55
analyzing-cobaltstrike-malleable-c2-profiles
54
analyzing-golang-malware-with-ghidra
54
testing-for-json-web-token-vulnerabilities
54
analyzing-memory-dumps-with-volatility
54
testing-for-broken-access-control
54
analyzing-heap-spray-exploitation
53
testing-oauth2-implementation-flaws
53
analyzing-threat-actor-ttps-with-mitre-attack
53
testing-for-host-header-injection
53
testing-cors-misconfiguration
53
exploiting-server-side-request-forgery
53
analyzing-office365-audit-logs-for-compromise
53
conducting-mobile-app-penetration-test
53
analyzing-powershell-script-block-logging
52
performing-soc2-type2-audit-preparation
52
performing-web-application-vulnerability-triage
52
exploiting-sql-injection-with-sqlmap
52
analyzing-outlook-pst-for-email-forensics
52
collecting-open-source-intelligence
51
testing-for-open-redirect-vulnerabilities
51
analyzing-malware-persistence-with-autoruns
51
analyzing-mft-for-deleted-file-recovery
51
analyzing-malware-family-relationships-with-malpedia
50
conducting-cloud-penetration-testing
50
analyzing-malware-behavior-with-cuckoo-sandbox
50
analyzing-web-server-logs-for-intrusion
50
conducting-full-scope-red-team-engagement
49
analyzing-macro-malware-in-office-documents
49
bypassing-authentication-with-forced-browsing
49
analyzing-security-logs-with-splunk
48
deobfuscating-javascript-malware
48
analyzing-windows-event-logs-in-splunk
48
analyzing-powershell-empire-artifacts
47
testing-for-xml-injection-vulnerabilities
47
analyzing-memory-forensics-with-lime-and-volatility
46
analyzing-ransomware-leak-site-intelligence
46
analyzing-lnk-file-and-jump-list-artifacts
46
testing-mobile-api-authentication
45
exploiting-idor-vulnerabilities
45
exploiting-api-injection-vulnerabilities
45
performing-web-application-firewall-bypass
45
analyzing-ransomware-encryption-mechanisms
45
testing-for-business-logic-vulnerabilities
44
analyzing-packed-malware-with-upx-unpacker
44
auditing-aws-s3-bucket-permissions
44
analyzing-typosquatting-domains-with-dnstwist
43
testing-api-for-mass-assignment-vulnerability
43
analyzing-pdf-malware-with-pdfid
43
analyzing-ransomware-network-indicators
43
analyzing-threat-actor-ttps-with-mitre-navigator
43
analyzing-threat-landscape-with-misp
42
performing-web-application-scanning-with-nikto
42
analyzing-persistence-mechanisms-in-linux
41
analyzing-tls-certificate-transparency-logs
41
testing-for-email-header-injection
41
analyzing-supply-chain-malware-artifacts
41
exploiting-http-request-smuggling
40
conducting-wireless-network-penetration-test
40
conducting-internal-network-penetration-test
40
testing-websocket-api-security
40
analyzing-prefetch-files-for-execution-history
39
building-vulnerability-scanning-workflow
39
exploiting-nosql-injection-vulnerabilities
39
conducting-internal-reconnaissance-with-bloodhound-ce
38
exploiting-oauth-misconfiguration
38
exploiting-websocket-vulnerabilities
37
exploiting-template-injection-vulnerabilities
37
performing-web-cache-poisoning-attack
37
auditing-terraform-infrastructure-for-security
36
performing-web-cache-deception-attack
36
analyzing-usb-device-connection-history
36
auditing-azure-active-directory-configuration
36
scanning-network-with-nmap-advanced
36
analyzing-sbom-for-supply-chain-vulnerabilities
36
conducting-pass-the-ticket-attack
35
building-incident-response-playbook
35
building-threat-intelligence-platform
35
analyzing-windows-prefetch-with-python
35
auditing-kubernetes-cluster-rbac
35
building-soc-playbook-for-ransomware
35
reverse-engineering-ios-app-with-frida
34
analyzing-windows-amcache-artifacts
34
exploiting-race-condition-vulnerabilities
34
performing-api-rate-limiting-bypass
34
analyzing-slack-space-and-file-system-artifacts
34
exploiting-mass-assignment-in-rest-apis
34
analyzing-windows-registry-for-artifacts
33
exploiting-insecure-deserialization
33
conducting-social-engineering-penetration-test
33
auditing-gcp-iam-permissions
33
performing-csrf-attack-simulation
33
triaging-security-incident
33
building-soc-metrics-and-kpi-tracking
33
performing-ssrf-vulnerability-exploitation
33
auditing-cloud-with-cis-benchmarks
33
exploiting-jwt-algorithm-confusion-attack
32
building-threat-actor-profile-from-osint
32
building-attack-pattern-library-from-cti-reports
32
building-vulnerability-dashboard-with-defectdojo
32
hardening-docker-containers-for-production
32
building-c2-infrastructure-with-sliver-framework
32
exploiting-prototype-pollution-in-javascript
32
performing-api-security-testing-with-postman
32
performing-wifi-password-cracking-with-aircrack
31
building-automated-malware-submission-pipeline
31
conducting-post-incident-lessons-learned
31
building-threat-intelligence-feed-integration
31
deobfuscating-powershell-obfuscated-malware
31
collecting-threat-intelligence-with-misp
31
conducting-man-in-the-middle-attack-simulation
31
conducting-cloud-incident-response
31
analyzing-windows-shellbag-artifacts
31
exploiting-broken-function-level-authorization
31
building-red-team-c2-infrastructure-with-havoc
31
configuring-oauth2-authorization-flow
31
building-detection-rules-with-sigma
31
detecting-api-enumeration-attacks
31
analyzing-windows-lnk-files-for-artifacts
30
testing-android-intents-for-vulnerabilities
30
conducting-phishing-incident-response
30
performing-graphql-security-assessment
30
performing-vulnerability-scanning-with-nessus
30
building-adversary-infrastructure-tracking-system
30
building-vulnerability-exception-tracking-system
30
building-soc-escalation-matrix
30
prioritizing-vulnerabilities-with-cvss-scoring
30
building-incident-response-dashboard
30
building-detection-rule-with-splunk-spl
29
reverse-engineering-malware-with-ghidra
29
automating-ioc-enrichment
29
exploiting-type-juggling-vulnerabilities
29
conducting-malware-incident-response
29
executing-red-team-engagement-planning
29
exploiting-active-directory-certificate-services-esc1
29
performing-api-inventory-and-discovery
28
building-malware-incident-communication-template
28
extracting-browser-history-artifacts
28
conducting-domain-persistence-with-dcsync
28
performing-network-traffic-analysis-with-tshark
27
building-threat-hunt-hypothesis-framework
27
exploiting-broken-link-hijacking
27
collecting-indicators-of-compromise
27
analyzing-ransomware-payment-wallets
27
tracking-threat-actor-infrastructure
27
performing-active-directory-penetration-test
27
executing-red-team-exercise
27
exploiting-deeplink-vulnerabilities
27
performing-jwt-none-algorithm-attack
26
exploiting-excessive-data-exposure-in-api
26
conducting-memory-forensics-with-volatility
26
scanning-docker-images-with-trivy
26
triaging-security-incident-with-ir-playbook
26
performing-subdomain-enumeration-with-subfinder
26
conducting-social-engineering-pretext-call
25
analyzing-uefi-bootkit-persistence
25
performing-graphql-introspection-attack
25
building-cloud-siem-with-sentinel
25
building-threat-intelligence-enrichment-in-splunk
25
exploiting-active-directory-with-bloodhound
25
exploiting-kerberoasting-with-impacket
25
triaging-vulnerabilities-with-ssvc-framework
25
building-vulnerability-aging-and-sla-tracking
25
building-ioc-enrichment-pipeline-with-opencti
25
performing-hash-cracking-with-hashcat
25
exploiting-vulnerabilities-with-metasploit-framework
25
building-identity-federation-with-saml-azure-ad
25
exploiting-insecure-data-storage-in-mobile
25
building-identity-governance-lifecycle-process
24
building-role-mining-for-rbac-optimization
24
exploiting-ipv6-vulnerabilities
24
building-devsecops-pipeline-with-gitlab-ci
24
exploiting-bgp-hijacking-vulnerabilities
24
triaging-security-alerts-in-splunk
24
auditing-tls-certificate-transparency-logs
24
building-incident-timeline-with-timesketch
24
performing-api-fuzzing-with-restler
23
performing-authenticated-vulnerability-scan
23
performing-clickjacking-attack-test
23
performing-ssl-tls-security-assessment
23
securing-api-gateway-with-aws-waf
23
detecting-ai-model-prompt-injection-attacks
23
configuring-network-segmentation-with-vlans
23
building-ioc-defanging-and-sharing-pipeline
22
reverse-engineering-rust-malware
22
implementing-api-rate-limiting-and-throttling
22
performing-wireless-network-penetration-test
22
collecting-volatile-evidence-from-compromised-host
22
scanning-containers-with-trivy-in-cicd
22
performing-threat-modeling-with-owasp-threat-dragon
22
performing-http-parameter-pollution-attack
22
configuring-pfsense-firewall-rules
22
building-phishing-reporting-button-workflow
21
performing-directory-traversal-testing
21
implementing-api-schema-validation-security
21
hardening-linux-endpoint-with-cis-benchmark
21
performing-android-app-static-analysis-with-mobsf
21
testing-ransomware-recovery-procedures
21
securing-github-actions-workflows
21
configuring-host-based-intrusion-detection
21
building-threat-feed-aggregation-with-misp
21
performing-binary-exploitation-analysis
21
conducting-spearphishing-simulation-campaign
21
performing-blind-ssrf-exploitation
20
scanning-container-images-with-grype
20
configuring-tls-1-3-for-secure-communications
20
exploiting-constrained-delegation-abuse
20
monitoring-darkweb-sources
20
building-ransomware-playbook-with-cisa-framework
20
extracting-credentials-from-memory-dump
20
implementing-secret-scanning-with-gitleaks
20
performing-dark-web-monitoring-for-threats
20
performing-network-forensics-with-wireshark
19
configuring-windows-defender-advanced-settings
19
performing-privilege-escalation-on-linux
19
exploiting-nopac-cve-2021-42278-42287
19
remediating-s3-bucket-misconfiguration
19
validating-backup-integrity-for-recovery
19
implementing-jwt-signing-and-verification
19
reverse-engineering-dotnet-malware-with-dnspy
19
performing-privilege-escalation-assessment
19
performing-wireless-security-assessment-with-kismet
19
reverse-engineering-ransomware-encryption-routine
19
building-patch-tuesday-response-process
19
implementing-api-security-posture-management
18
performing-security-headers-audit
18
detecting-sql-injection-via-waf-logs
18
exploiting-smb-vulnerabilities-with-metasploit
18
exploiting-zerologon-vulnerability-cve-2020-1472
18
performing-ssl-stripping-attack
18
detecting-shadow-api-endpoints
18
scanning-kubernetes-manifests-with-kubesec
18
performing-second-order-sql-injection
18
configuring-certificate-authority-with-openssl
18
performing-kubernetes-penetration-testing
18
performing-graphql-depth-limit-attack
18
detecting-aws-iam-privilege-escalation
18
hardening-docker-daemon-configuration
18
correlating-threat-campaigns
17
securing-aws-lambda-execution-roles
17
implementing-api-gateway-security-controls
17
deploying-cloudflare-access-for-zero-trust
17
performing-aws-privilege-escalation-assessment
17
hunting-advanced-persistent-threats
17
performing-container-security-scanning-with-trivy
17
performing-network-packet-capture-analysis
17
performing-user-behavior-analytics
17
performing-power-grid-cybersecurity-assessment
16
configuring-active-directory-tiered-model
16
securing-serverless-functions
16
deploying-edr-agent-with-crowdstrike
16
scanning-infrastructure-with-nessus
16
performing-vlan-hopping-attack
16
configuring-windows-event-logging-for-detection
16
performing-active-directory-vulnerability-assessment
16
configuring-suricata-for-network-monitoring
16
performing-cve-prioritization-with-kev-catalog
16
performing-mobile-app-certificate-pinning-bypass
16
performing-active-directory-bloodhound-analysis
16
deploying-tailscale-for-zero-trust-vpn
16
extracting-iocs-from-malware-samples
16
extracting-windows-event-logs-artifacts
15
securing-kubernetes-on-cloud
15
performing-red-team-with-covenant
15
performing-ai-driven-osint-correlation
15
detecting-anomalous-authentication-patterns
15
exploiting-ms17-010-eternalblue-vulnerability
15
hunting-for-dns-based-persistence
15
performing-serverless-function-security-review
15
performing-external-network-penetration-test
15
securing-aws-iam-permissions
15
detecting-aws-cloudtrail-anomalies
15
performing-active-directory-compromise-investigation
15
performing-cloud-penetration-testing-with-pacu
15
hunting-for-supply-chain-compromise
15
performing-osint-with-spiderfoot
15
securing-container-registry-images
15
detecting-email-account-compromise
15
configuring-aws-verified-access-for-ztna
15
performing-privileged-account-discovery
15
performing-open-source-intelligence-gathering
15
implementing-api-key-security-controls
15
configuring-microsegmentation-for-zero-trust
15
performing-ssl-tls-inspection-configuration
15
implementing-api-abuse-detection-with-rate-limiting
15
containing-active-breach
15
performing-content-security-policy-bypass
14
detecting-insider-threat-behaviors
14
detecting-dll-sideloading-attacks
14
analyzing-cobalt-strike-malleable-profiles
14
securing-helm-chart-deployments
14
performing-red-team-phishing-with-gophish
14
hunting-for-unusual-network-connections
14
integrating-dast-with-owasp-zap-in-pipeline
14
performing-firmware-malware-analysis
14
detecting-anomalies-in-industrial-control-systems
14
detecting-email-forwarding-rules-attack
14
implementing-attack-surface-management
14
securing-remote-access-to-ot-environment
14
generating-threat-intelligence-reports
14
performing-active-directory-forest-trust-attack
14
hunting-credential-stuffing-attacks
14
performing-aws-account-enumeration-with-scout-suite
14
detecting-supply-chain-attacks-in-ci-cd
14
detecting-attacks-on-scada-systems
14
performing-threat-hunting-with-yara-rules
14
performing-packet-injection-attack
14
hunting-for-webshell-activity
14
intercepting-mobile-traffic-with-burpsuite
14
mapping-mitre-attack-techniques
13
performing-kerberoasting-attack
13
configuring-hsm-for-key-storage
13
configuring-snort-ids-for-intrusion-detection
13
implementing-mitre-attack-coverage-mapping
13
integrating-sast-into-github-actions-pipeline
13
deploying-palo-alto-prisma-access-zero-trust
13
performing-threat-landscape-assessment-for-sector
13
deploying-ransomware-canary-files
13
executing-phishing-simulation-campaign
13
implementing-pci-dss-compliance-controls
13
performing-ios-app-security-assessment
13
performing-ssl-certificate-lifecycle-management
13
performing-arp-spoofing-attack-simulation
13
hunting-for-spearphishing-indicators
12
implementing-aes-encryption-for-data-at-rest
12
performing-memory-forensics-with-volatility3
12
profiling-threat-actor-groups
12
performing-network-traffic-analysis-with-zeek
12
configuring-identity-aware-proxy-with-google-iap
12
deploying-osquery-for-endpoint-monitoring
12
performing-thick-client-application-penetration-test
12
implementing-network-access-control
12
performing-purple-team-exercise
12
building-cloud-security-posture-management
12
analyzing-phishing-email-headers
12
performing-service-account-audit
12
performing-oauth-scope-minimization-review
12
detecting-oauth-token-theft
12
implementing-kubernetes-pod-security-standards
12
detecting-suspicious-oauth-application-consent
12
performing-threat-hunting-with-elastic-siem
12
implementing-semgrep-for-custom-sast-rules
12
performing-sca-dependency-scanning-with-snyk
12
hunting-for-dcsync-attacks
12
detecting-s3-data-exfiltration-attempts
12
hardening-windows-endpoint-with-cis-benchmark
12
detecting-business-email-compromise
12
performing-authenticated-scan-with-openvas
12
securing-azure-with-microsoft-defender
12
detecting-privilege-escalation-attempts
12
detecting-broken-object-property-level-authorization
12
performing-endpoint-forensics-investigation
12
implementing-llm-guardrails-for-security
12
detecting-arp-poisoning-in-network-traffic
12
hunting-for-anomalous-powershell-execution
12
performing-service-account-credential-rotation
11
configuring-ldap-security-hardening
11
implementing-devsecops-security-scanning
11
detecting-fileless-attacks-on-endpoints
11
performing-ot-vulnerability-assessment-with-claroty
11
hunting-for-data-exfiltration-indicators
11
detecting-dns-exfiltration-with-dns-query-analysis
11
detecting-dcsync-attack-in-active-directory
11
implementing-aws-iam-permission-boundaries
11
detecting-lateral-movement-in-network
11
implementing-api-threat-protection-with-apigee
11
performing-yara-rule-development-for-detection
11
implementing-threat-intelligence-lifecycle-management
11
implementing-api-security-testing-with-42crunch
11
detecting-business-email-compromise-with-ai
11
performing-agentless-vulnerability-scanning
11
performing-supply-chain-attack-simulation
11
hunting-for-process-injection-techniques
11
performing-lateral-movement-with-wmiexec
11
performing-linux-log-forensics-investigation
11
performing-cryptographic-audit-of-application
11
detecting-aws-guardduty-findings-automation
11
detecting-container-escape-attempts
11
executing-active-directory-attack-simulation
11
performing-nist-csf-maturity-assessment
11
conducting-mobile-application-penetration-test
11
performing-physical-intrusion-assessment
11
performing-ransomware-response
11
detecting-kerberoasting-attacks
11
performing-ot-vulnerability-scanning-safely
11
eradicating-malware-from-infected-systems
11
performing-mobile-device-forensics-with-cellebrite
11
performing-steganography-detection
11
detecting-pass-the-hash-attacks
11
performing-timeline-reconstruction-with-plaso
11
configuring-multi-factor-authentication-with-duo
11
hunting-for-registry-run-key-persistence
11
hunting-for-dns-tunneling-with-zeek
11
performing-phishing-simulation-with-gophish
10
extracting-config-from-agent-tesla-rat
10
performing-windows-artifact-analysis-with-eric-zimmerman-tools
10
implementing-threat-modeling-with-mitre-attack
10
performing-threat-emulation-with-atomic-red-team
10
configuring-zscaler-private-access-for-ztna
10
implementing-gdpr-data-protection-controls
10
performing-privileged-account-access-review
10
implementing-attack-path-analysis-with-xm-cyber
10
detecting-serverless-function-injection
10
performing-cloud-asset-inventory-with-cartography
10
hunting-for-suspicious-scheduled-tasks
10
implementing-aqua-security-for-container-scanning
10
performing-privacy-impact-assessment
10
implementing-iso-27001-information-security-management
10
performing-container-image-hardening
10
performing-adversary-in-the-middle-phishing-detection
10
implementing-security-chaos-engineering
10
extracting-memory-artifacts-with-rekall
10
correlating-security-events-in-qradar
10
performing-memory-forensics-with-volatility3-plugins
10
implementing-google-workspace-phishing-protection
10
detecting-azure-lateral-movement
10
hunting-for-unusual-service-installations
10
detecting-insider-threat-with-ueba
10
detecting-azure-storage-account-misconfigurations
10
performing-ot-network-security-assessment
10
implementing-anti-phishing-training-program
10
hunting-for-command-and-control-beaconing
10
performing-dynamic-analysis-of-android-app
10
conducting-cloud-infrastructure-penetration-test
10
implementing-zero-trust-network-access
10
performing-kubernetes-cis-benchmark-with-kube-bench
10
detecting-cryptomining-in-cloud
10
detecting-ransomware-precursors-in-network
10
detecting-azure-service-principal-abuse
9
performing-gcp-security-assessment-with-forseti
9
recovering-from-ransomware-attack
9
implementing-network-intrusion-prevention-with-suricata
9
detecting-cloud-threats-with-guardduty
9
implementing-google-workspace-sso-configuration
9
detecting-attacks-on-historian-servers
9
performing-credential-access-with-lazagne
9
securing-container-registry-with-harbor
9
hunting-for-ntlm-relay-attacks
9
performing-malware-persistence-investigation
9
performing-malware-hash-enrichment-with-virustotal
9
implementing-vulnerability-management-with-greenbone
9
performing-plc-firmware-security-analysis
9
implementing-zero-trust-in-cloud
9
implementing-cloud-vulnerability-posture-management
9
hunting-for-cobalt-strike-beacons
9
implementing-zero-trust-for-saas-applications
9
performing-ransomware-tabletop-exercise
9
implementing-network-segmentation-with-firewall-zones
9
performing-static-malware-analysis-with-pe-studio
9
hunting-for-persistence-mechanisms-in-windows
9
performing-dns-enumeration-and-zone-transfer
9
detecting-dnp3-protocol-anomalies
9
hunting-for-data-staging-before-exfiltration
9
detecting-deepfake-audio-in-vishing-attacks
9
investigating-phishing-email-incident
9
implementing-web-application-logging-with-modsecurity
9
detecting-network-scanning-with-ids-signatures
9
implementing-alert-fatigue-reduction
9
detecting-credential-dumping-techniques
9
securing-historian-server-in-ot-environment
9
performing-endpoint-vulnerability-remediation
9
performing-threat-intelligence-sharing-with-misp
9
detecting-golden-ticket-attacks-in-kerberos-logs
9
implementing-cisa-zero-trust-maturity-model
9
performing-iot-security-assessment
9
performing-automated-malware-analysis-with-cape
9
detecting-modbus-command-injection-attacks
9
performing-indicator-lifecycle-management
9
hunting-for-lateral-movement-via-wmi
9
performing-disk-forensics-investigation
9
hunting-for-registry-persistence-mechanisms
9
performing-asset-criticality-scoring-for-vulns
9
performing-malware-triage-with-yara
9
detecting-network-anomalies-with-zeek
9
deploying-decoy-files-for-ransomware-detection
9
implementing-network-segmentation-for-ot
8
performing-scada-hmi-security-assessment
8
detecting-exfiltration-over-dns-with-zeek
8
implementing-dmarc-dkim-spf-email-security
8
hunting-for-scheduled-task-persistence
8
performing-purple-team-atomic-testing
8
detecting-shadow-it-cloud-usage
8
implementing-google-workspace-admin-security
8
implementing-application-whitelisting-with-applocker
8
performing-kubernetes-etcd-security-assessment
8
hunting-for-persistence-via-wmi-subscriptions
8
implementing-network-access-control-with-cisco-ise
8
implementing-github-advanced-security-for-code-scanning
8
performing-cloud-native-forensics-with-falco
8
detecting-port-scanning-with-fail2ban
8
implementing-rsa-key-pair-management
8
performing-bandwidth-throttling-attack-simulation
8
implementing-mobile-application-management
8
performing-malware-ioc-extraction
8
implementing-privileged-session-monitoring
8
performing-fuzzing-with-aflplusplus
8
implementing-network-policies-for-kubernetes
8
hunting-for-living-off-the-cloud-techniques
8
performing-dns-tunneling-detection
8
performing-docker-bench-security-assessment
8
hunting-for-shadow-copy-deletion
8
deploying-software-defined-perimeter
8
implementing-infrastructure-as-code-security-scanning
8
detecting-lateral-movement-with-splunk
8
detecting-container-escape-with-falco-rules
8
hunting-for-domain-fronting-c2-traffic
8
performing-soap-web-service-security-testing
8
performing-soc-tabletop-exercise
8
performing-firmware-extraction-with-binwalk
8
processing-stix-taxii-feeds
8
performing-log-analysis-for-forensic-investigation
8
hunting-for-defense-evasion-via-timestomping
8
hunting-for-t1098-account-manipulation
8
implementing-siem-correlation-rules-for-apt
8
detecting-fileless-malware-techniques
8
performing-paste-site-monitoring-for-credentials
8
performing-ip-reputation-analysis-with-shodan
8
implementing-secrets-scanning-in-ci-cd
8
deploying-active-directory-honeytokens
8
hunting-for-startup-folder-persistence
8
implementing-secrets-management-with-vault
8
hunting-for-lolbins-execution-in-endpoint-logs
8
evaluating-threat-intelligence-platforms
8
implementing-end-to-end-encryption-for-messaging
8
detecting-aws-credential-exposure-with-trufflehog
8
performing-dynamic-analysis-with-any-run
8
detecting-bluetooth-low-energy-attacks
8
detecting-process-injection-techniques
8
implementing-aws-config-rules-for-compliance
8
implementing-anti-ransomware-group-policy
8
implementing-ddos-mitigation-with-cloudflare
7
detecting-golden-ticket-forgery
7
detecting-qr-code-phishing-with-email-security
7
investigating-insider-threat-indicators
7
performing-cloud-log-forensics-with-athena
7
implementing-next-generation-firewall-with-palo-alto
7
implementing-pod-security-admission-controller
7
implementing-patch-management-for-ot-systems
7
implementing-hashicorp-vault-dynamic-secrets
7
implementing-stix-taxii-feed-integration
7
performing-access-review-and-certification
7
detecting-container-drift-at-runtime
7
detecting-suspicious-powershell-execution
7
performing-oil-gas-cybersecurity-assessment
7
implementing-ransomware-backup-strategy
7
implementing-rbac-hardening-for-kubernetes
7
performing-false-positive-reduction-in-siem
7
implementing-kubernetes-network-policy-with-calico
7
detecting-beaconing-patterns-with-zeek
7
performing-bluetooth-security-assessment
7
performing-sqlite-database-forensics
7
implementing-network-traffic-analysis-with-arkime
7
detecting-insider-data-exfiltration-via-dlp
7
detecting-typosquatting-packages-in-npm-pypi
7
implementing-zero-trust-dns-with-nextdns
7
performing-ics-asset-discovery-with-claroty
7
managing-intelligence-lifecycle
7
performing-cloud-forensics-with-aws-cloudtrail
7
performing-container-escape-detection
7
detecting-compromised-cloud-credentials
7
performing-lateral-movement-detection
7
implementing-gdpr-data-subject-access-request
7
performing-insider-threat-investigation
7
implementing-network-traffic-baselining
7
auditing-kubernetes-rbac-permissions
7
performing-ioc-enrichment-automation
7
performing-cloud-incident-containment-procedures
7
performing-cloud-forensics-investigation
7
implementing-patch-management-workflow
7
implementing-ot-network-traffic-analysis-with-nozomi
7
implementing-endpoint-detection-with-wazuh
7
hunting-for-dcom-lateral-movement
7
hunting-for-living-off-the-land-binaries
7
detecting-service-account-abuse
7
performing-dmarc-policy-enforcement-rollout
7
implementing-zero-knowledge-proof-for-authentication
7
hunting-for-beaconing-with-frequency-analysis
7
detecting-process-hollowing-technique
7
performing-gcp-penetration-testing-with-gcpbucketbrute
7
implementing-gcp-binary-authorization
7
implementing-vulnerability-remediation-sla
6
implementing-privileged-access-management-with-cyberark
6
implementing-endpoint-dlp-controls
6
detecting-living-off-the-land-with-lolbas
6
implementing-passwordless-auth-with-microsoft-entra
6
implementing-honeytokens-for-breach-detection
6
implementing-memory-protection-with-dep-aslr
6
implementing-siem-use-case-tuning
6
implementing-zero-trust-network-access-with-zscaler
6
investigating-ransomware-attack-artifacts
6
detecting-spearphishing-with-email-gateway
6
implementing-zero-trust-with-hashicorp-boundary
6
implementing-cloud-waf-rules
6
detecting-modbus-protocol-anomalies
6
implementing-soar-automation-with-phantom
6
implementing-runtime-application-self-protection
6
implementing-epss-score-for-vulnerability-prioritization
6
detecting-pass-the-ticket-attacks
6
implementing-pam-for-database-access
6
implementing-gcp-vpc-firewall-rules
6
implementing-azure-defender-for-cloud
6
implementing-policy-as-code-with-open-policy-agent
6
detecting-mimikatz-execution-patterns
6
implementing-aws-security-hub-compliance
6
implementing-identity-verification-for-zero-trust
6
detecting-privilege-escalation-in-kubernetes-pods
6
managing-cloud-identity-with-okta
6
implementing-ransomware-kill-switch-detection
6
performing-brand-monitoring-for-impersonation
6
performing-post-quantum-cryptography-migration
6
detecting-rdp-brute-force-attacks
6
implementing-canary-tokens-for-network-intrusion
6
implementing-aws-security-hub
6
performing-hardware-security-module-integration
6
performing-alert-triage-with-elastic-siem
6
detecting-stuxnet-style-attacks
6
performing-file-carving-with-foremost
6
detecting-living-off-the-land-attacks
6
recovering-deleted-files-with-photorec
6
implementing-beyondcorp-zero-trust-access-model
6
implementing-azure-ad-privileged-identity-management
6
implementing-soar-playbook-with-palo-alto-xsoar
6
performing-cloud-storage-forensic-acquisition
6
implementing-code-signing-for-artifacts
6
implementing-identity-governance-with-sailpoint
5
implementing-scim-provisioning-with-okta
5
implementing-fuzz-testing-in-cicd-with-aflplusplus
5
implementing-immutable-backup-with-restic
5
detecting-t1055-process-injection-with-sysmon
5
implementing-data-loss-prevention-with-microsoft-purview
5
performing-entitlement-review-with-sailpoint-iiq
5
implementing-passwordless-authentication-with-fido2
5
implementing-network-deception-with-honeypots
5
detecting-mobile-malware-behavior
5
implementing-bgp-security-with-rpki
5
implementing-mimecast-targeted-attack-protection
5
implementing-velociraptor-for-ir-collection
5
implementing-vulnerability-sla-breach-alerting
5
detecting-command-and-control-over-dns
5
performing-cloud-native-threat-hunting-with-aws-detective
5
implementing-gcp-organization-policy-constraints
5
detecting-wmi-persistence
5
implementing-container-network-policies-with-calico
5
implementing-aws-macie-for-data-classification
5
implementing-siem-use-cases-for-detection
5
implementing-privileged-access-workstation
5
performing-deception-technology-deployment
5
implementing-cloud-workload-protection
5
implementing-log-integrity-with-blockchain
5
implementing-rapid7-insightvm-for-scanning
5
implementing-aws-nitro-enclave-security
5
implementing-browser-isolation-for-zero-trust
5
implementing-supply-chain-security-with-in-toto
5
performing-s7comm-protocol-security-analysis
5
detecting-evasion-techniques-in-endpoint-logs
5
implementing-email-sandboxing-with-proofpoint
5
performing-log-source-onboarding-in-siem
5
implementing-iec-62443-security-zones
5
performing-initial-access-with-evilginx3
5
implementing-cloud-security-posture-management
5
implementing-image-provenance-verification-with-cosign
5
implementing-ticketing-system-for-incidents
5
performing-cloud-penetration-testing
5
implementing-cloud-trail-log-analysis
4
implementing-proofpoint-email-security-gateway
4
implementing-file-integrity-monitoring-with-aide
4
implementing-dragos-platform-for-ot-monitoring
4
implementing-container-image-minimal-base-with-distroless
4
implementing-mtls-for-zero-trust-services
4
implementing-sigstore-for-software-signing
4
implementing-hardware-security-key-authentication
4
implementing-zero-standing-privilege-with-cyberark
4
implementing-digital-signatures-with-ed25519
4
implementing-device-posture-assessment-in-zero-trust
4
implementing-saml-sso-with-okta
4
implementing-log-forwarding-with-fluentd
4
implementing-diamond-model-analysis
4
implementing-security-monitoring-with-datadog
4
detecting-rootkit-activity
4
implementing-nerc-cip-compliance-controls
4
implementing-conduit-security-for-ot-remote-access
4
implementing-just-in-time-access-provisioning
4
implementing-usb-device-control-policy
4
implementing-taxii-server-with-opentaxii
4
detecting-t1003-credential-dumping-with-edr
4
implementing-syslog-centralization-with-rsyslog
4
implementing-disk-encryption-with-bitlocker
4
detecting-ntlm-relay-with-event-correlation
4
performing-access-recertification-with-saviynt
4
implementing-security-information-sharing-with-stix2
4
implementing-conditional-access-policies-azure-ad
4
containing-active-security-breach
4
implementing-cloud-dlp-for-data-protection
4
implementing-microsegmentation-with-guardicore
4
detecting-t1548-abuse-elevation-control-mechanism
4
implementing-ot-incident-response-playbook
4
implementing-zero-trust-with-beyondcorp
4
implementing-envelope-encryption-with-aws-kms
4
implementing-soar-playbook-for-phishing
4
implementing-honeypot-for-ransomware-detection
4
detecting-ransomware-encryption-behavior
4
implementing-opa-gatekeeper-for-policy-enforcement
4
implementing-runtime-security-with-tetragon
4
implementing-continuous-security-validation-with-bas
4
implementing-deception-based-detection-with-canarytoken
4
implementing-ics-firewall-with-tofino
3
detecting-malicious-scheduled-tasks-with-sysmon
3
implementing-delinea-secret-server-for-pam
3
monitoring-scada-modbus-traffic-anomalies
3
implementing-purdue-model-network-segmentation
3
detecting-misconfigured-azure-storage
3
implementing-ebpf-security-monitoring
3
detecting-cloud-cryptomining-activity
2
hunting-living-off-the-land-binaries
2
performing-ransomware-incident-response
2
detecting-lateral-movement-with-zeek
2
implementing-threat-intelligence-platform
1
implementing-rbac-for-kubernetes-cluster
1
hunting-for-webshells-in-web-servers
1
detecting-golden-ticket-attacks
1
executing-diamond-model-analysis
1