mukul975/anthropic-cybersecurity-skills

770 skills15.4K total installsGithubGithubGitHub

acquiring-disk-image-with-dd-and-dcfldd

119

analyzing-api-gateway-access-logs

103

analyzing-android-malware-with-apktool

99

analyzing-cyber-kill-chain

90

analyzing-email-headers-for-phishing-investigation

83

analyzing-active-directory-acl-abuse

83

analyzing-browser-forensics-with-hindsight

83

conducting-api-security-testing

81

analyzing-cloud-storage-access-patterns

80

analyzing-command-and-control-communication

80

analyzing-network-traffic-with-wireshark

78

performing-web-application-penetration-test

77

analyzing-certificate-transparency-for-phishing

77

testing-for-xss-vulnerabilities

75

analyzing-apt-group-with-mitre-navigator

75

analyzing-docker-container-forensics

75

testing-api-security-with-owasp-top-10

74

analyzing-azure-activity-logs-for-threats

73

conducting-network-penetration-test

73

analyzing-dns-logs-for-exfiltration

73

analyzing-linux-audit-logs-for-intrusion

73

testing-jwt-token-security

72

analyzing-network-packets-with-scapy

70

analyzing-malicious-url-with-urlscan

68

analyzing-linux-kernel-rootkits

68

reverse-engineering-android-malware-with-jadx

67

analyzing-network-traffic-of-malware

66

conducting-external-reconnaissance-with-osint

66

analyzing-ios-app-security-with-objection

66

analyzing-bootkit-and-rootkit-samples

65

exploiting-sql-injection-vulnerabilities

65

analyzing-network-traffic-for-incidents

63

analyzing-indicators-of-compromise

62

analyzing-linux-elf-malware

62

analyzing-campaign-attribution-evidence

61

analyzing-kubernetes-audit-logs

60

analyzing-linux-system-artifacts

60

analyzing-ethereum-smart-contract-vulnerabilities

60

analyzing-disk-image-with-autopsy

59

testing-for-xxe-injection-vulnerabilities

58

testing-api-for-broken-object-level-authorization

58

analyzing-threat-intelligence-feeds

58

analyzing-network-flow-data-with-netflow

57

analyzing-network-covert-channels-in-malware

56

testing-for-sensitive-data-exposure

56

testing-for-xss-vulnerabilities-with-burpsuite

56

analyzing-malware-sandbox-evasion-techniques

56

testing-api-authentication-weaknesses

56

analyzing-cobalt-strike-beacon-configuration

55

analyzing-malicious-pdf-with-peepdf

55

analyzing-cobaltstrike-malleable-c2-profiles

54

analyzing-golang-malware-with-ghidra

54

testing-for-json-web-token-vulnerabilities

54

analyzing-memory-dumps-with-volatility

54

testing-for-broken-access-control

54

analyzing-heap-spray-exploitation

53

testing-oauth2-implementation-flaws

53

analyzing-threat-actor-ttps-with-mitre-attack

53

testing-for-host-header-injection

53

testing-cors-misconfiguration

53

exploiting-server-side-request-forgery

53

analyzing-office365-audit-logs-for-compromise

53

conducting-mobile-app-penetration-test

53

analyzing-powershell-script-block-logging

52

performing-soc2-type2-audit-preparation

52

performing-web-application-vulnerability-triage

52

exploiting-sql-injection-with-sqlmap

52

analyzing-outlook-pst-for-email-forensics

52

collecting-open-source-intelligence

51

testing-for-open-redirect-vulnerabilities

51

analyzing-malware-persistence-with-autoruns

51

analyzing-mft-for-deleted-file-recovery

51

analyzing-malware-family-relationships-with-malpedia

50

conducting-cloud-penetration-testing

50

analyzing-malware-behavior-with-cuckoo-sandbox

50

analyzing-web-server-logs-for-intrusion

50

conducting-full-scope-red-team-engagement

49

analyzing-macro-malware-in-office-documents

49

bypassing-authentication-with-forced-browsing

49

analyzing-security-logs-with-splunk

48

deobfuscating-javascript-malware

48

analyzing-windows-event-logs-in-splunk

48

analyzing-powershell-empire-artifacts

47

testing-for-xml-injection-vulnerabilities

47

analyzing-memory-forensics-with-lime-and-volatility

46

analyzing-ransomware-leak-site-intelligence

46

analyzing-lnk-file-and-jump-list-artifacts

46

testing-mobile-api-authentication

45

exploiting-idor-vulnerabilities

45

exploiting-api-injection-vulnerabilities

45

performing-web-application-firewall-bypass

45

analyzing-ransomware-encryption-mechanisms

45

testing-for-business-logic-vulnerabilities

44

analyzing-packed-malware-with-upx-unpacker

44

auditing-aws-s3-bucket-permissions

44

analyzing-typosquatting-domains-with-dnstwist

43

testing-api-for-mass-assignment-vulnerability

43

analyzing-pdf-malware-with-pdfid

43

analyzing-ransomware-network-indicators

43

analyzing-threat-actor-ttps-with-mitre-navigator

43

analyzing-threat-landscape-with-misp

42

performing-web-application-scanning-with-nikto

42

analyzing-persistence-mechanisms-in-linux

41

analyzing-tls-certificate-transparency-logs

41

testing-for-email-header-injection

41

analyzing-supply-chain-malware-artifacts

41

exploiting-http-request-smuggling

40

conducting-wireless-network-penetration-test

40

conducting-internal-network-penetration-test

40

testing-websocket-api-security

40

analyzing-prefetch-files-for-execution-history

39

building-vulnerability-scanning-workflow

39

exploiting-nosql-injection-vulnerabilities

39

conducting-internal-reconnaissance-with-bloodhound-ce

38

exploiting-oauth-misconfiguration

38

exploiting-websocket-vulnerabilities

37

exploiting-template-injection-vulnerabilities

37

performing-web-cache-poisoning-attack

37

auditing-terraform-infrastructure-for-security

36

performing-web-cache-deception-attack

36

analyzing-usb-device-connection-history

36

auditing-azure-active-directory-configuration

36

scanning-network-with-nmap-advanced

36

analyzing-sbom-for-supply-chain-vulnerabilities

36

conducting-pass-the-ticket-attack

35

building-incident-response-playbook

35

building-threat-intelligence-platform

35

analyzing-windows-prefetch-with-python

35

auditing-kubernetes-cluster-rbac

35

building-soc-playbook-for-ransomware

35

reverse-engineering-ios-app-with-frida

34

analyzing-windows-amcache-artifacts

34

exploiting-race-condition-vulnerabilities

34

performing-api-rate-limiting-bypass

34

analyzing-slack-space-and-file-system-artifacts

34

exploiting-mass-assignment-in-rest-apis

34

analyzing-windows-registry-for-artifacts

33

exploiting-insecure-deserialization

33

conducting-social-engineering-penetration-test

33

auditing-gcp-iam-permissions

33

performing-csrf-attack-simulation

33

triaging-security-incident

33

building-soc-metrics-and-kpi-tracking

33

performing-ssrf-vulnerability-exploitation

33

auditing-cloud-with-cis-benchmarks

33

exploiting-jwt-algorithm-confusion-attack

32

building-threat-actor-profile-from-osint

32

building-attack-pattern-library-from-cti-reports

32

building-vulnerability-dashboard-with-defectdojo

32

hardening-docker-containers-for-production

32

building-c2-infrastructure-with-sliver-framework

32

exploiting-prototype-pollution-in-javascript

32

performing-api-security-testing-with-postman

32

performing-wifi-password-cracking-with-aircrack

31

building-automated-malware-submission-pipeline

31

conducting-post-incident-lessons-learned

31

building-threat-intelligence-feed-integration

31

deobfuscating-powershell-obfuscated-malware

31

collecting-threat-intelligence-with-misp

31

conducting-man-in-the-middle-attack-simulation

31

conducting-cloud-incident-response

31

analyzing-windows-shellbag-artifacts

31

exploiting-broken-function-level-authorization

31

building-red-team-c2-infrastructure-with-havoc

31

configuring-oauth2-authorization-flow

31

building-detection-rules-with-sigma

31

detecting-api-enumeration-attacks

31

analyzing-windows-lnk-files-for-artifacts

30

testing-android-intents-for-vulnerabilities

30

conducting-phishing-incident-response

30

performing-graphql-security-assessment

30

performing-vulnerability-scanning-with-nessus

30

building-adversary-infrastructure-tracking-system

30

building-vulnerability-exception-tracking-system

30

building-soc-escalation-matrix

30

prioritizing-vulnerabilities-with-cvss-scoring

30

building-incident-response-dashboard

30

building-detection-rule-with-splunk-spl

29

reverse-engineering-malware-with-ghidra

29

automating-ioc-enrichment

29

exploiting-type-juggling-vulnerabilities

29

conducting-malware-incident-response

29

executing-red-team-engagement-planning

29

exploiting-active-directory-certificate-services-esc1

29

performing-api-inventory-and-discovery

28

building-malware-incident-communication-template

28

extracting-browser-history-artifacts

28

conducting-domain-persistence-with-dcsync

28

performing-network-traffic-analysis-with-tshark

27

building-threat-hunt-hypothesis-framework

27

exploiting-broken-link-hijacking

27

collecting-indicators-of-compromise

27

analyzing-ransomware-payment-wallets

27

tracking-threat-actor-infrastructure

27

performing-active-directory-penetration-test

27

executing-red-team-exercise

27

exploiting-deeplink-vulnerabilities

27

performing-jwt-none-algorithm-attack

26

exploiting-excessive-data-exposure-in-api

26

conducting-memory-forensics-with-volatility

26

scanning-docker-images-with-trivy

26

triaging-security-incident-with-ir-playbook

26

performing-subdomain-enumeration-with-subfinder

26

conducting-social-engineering-pretext-call

25

analyzing-uefi-bootkit-persistence

25

performing-graphql-introspection-attack

25

building-cloud-siem-with-sentinel

25

building-threat-intelligence-enrichment-in-splunk

25

exploiting-active-directory-with-bloodhound

25

exploiting-kerberoasting-with-impacket

25

triaging-vulnerabilities-with-ssvc-framework

25

building-vulnerability-aging-and-sla-tracking

25

building-ioc-enrichment-pipeline-with-opencti

25

performing-hash-cracking-with-hashcat

25

exploiting-vulnerabilities-with-metasploit-framework

25

building-identity-federation-with-saml-azure-ad

25

exploiting-insecure-data-storage-in-mobile

25

building-identity-governance-lifecycle-process

24

building-role-mining-for-rbac-optimization

24

exploiting-ipv6-vulnerabilities

24

building-devsecops-pipeline-with-gitlab-ci

24

exploiting-bgp-hijacking-vulnerabilities

24

triaging-security-alerts-in-splunk

24

auditing-tls-certificate-transparency-logs

24

building-incident-timeline-with-timesketch

24

performing-api-fuzzing-with-restler

23

performing-authenticated-vulnerability-scan

23

performing-clickjacking-attack-test

23

performing-ssl-tls-security-assessment

23

securing-api-gateway-with-aws-waf

23

detecting-ai-model-prompt-injection-attacks

23

configuring-network-segmentation-with-vlans

23

building-ioc-defanging-and-sharing-pipeline

22

reverse-engineering-rust-malware

22

implementing-api-rate-limiting-and-throttling

22

performing-wireless-network-penetration-test

22

collecting-volatile-evidence-from-compromised-host

22

scanning-containers-with-trivy-in-cicd

22

performing-threat-modeling-with-owasp-threat-dragon

22

performing-http-parameter-pollution-attack

22

configuring-pfsense-firewall-rules

22

building-phishing-reporting-button-workflow

21

performing-directory-traversal-testing

21

implementing-api-schema-validation-security

21

hardening-linux-endpoint-with-cis-benchmark

21

performing-android-app-static-analysis-with-mobsf

21

testing-ransomware-recovery-procedures

21

securing-github-actions-workflows

21

configuring-host-based-intrusion-detection

21

building-threat-feed-aggregation-with-misp

21

performing-binary-exploitation-analysis

21

conducting-spearphishing-simulation-campaign

21

performing-blind-ssrf-exploitation

20

scanning-container-images-with-grype

20

configuring-tls-1-3-for-secure-communications

20

exploiting-constrained-delegation-abuse

20

monitoring-darkweb-sources

20

building-ransomware-playbook-with-cisa-framework

20

extracting-credentials-from-memory-dump

20

implementing-secret-scanning-with-gitleaks

20

performing-dark-web-monitoring-for-threats

20

performing-network-forensics-with-wireshark

19

configuring-windows-defender-advanced-settings

19

performing-privilege-escalation-on-linux

19

exploiting-nopac-cve-2021-42278-42287

19

remediating-s3-bucket-misconfiguration

19

validating-backup-integrity-for-recovery

19

implementing-jwt-signing-and-verification

19

reverse-engineering-dotnet-malware-with-dnspy

19

performing-privilege-escalation-assessment

19

performing-wireless-security-assessment-with-kismet

19

reverse-engineering-ransomware-encryption-routine

19

building-patch-tuesday-response-process

19

implementing-api-security-posture-management

18

performing-security-headers-audit

18

detecting-sql-injection-via-waf-logs

18

exploiting-smb-vulnerabilities-with-metasploit

18

exploiting-zerologon-vulnerability-cve-2020-1472

18

performing-ssl-stripping-attack

18

detecting-shadow-api-endpoints

18

scanning-kubernetes-manifests-with-kubesec

18

performing-second-order-sql-injection

18

configuring-certificate-authority-with-openssl

18

performing-kubernetes-penetration-testing

18

performing-graphql-depth-limit-attack

18

detecting-aws-iam-privilege-escalation

18

hardening-docker-daemon-configuration

18

correlating-threat-campaigns

17

securing-aws-lambda-execution-roles

17

implementing-api-gateway-security-controls

17

deploying-cloudflare-access-for-zero-trust

17

performing-aws-privilege-escalation-assessment

17

hunting-advanced-persistent-threats

17

performing-container-security-scanning-with-trivy

17

performing-network-packet-capture-analysis

17

performing-user-behavior-analytics

17

performing-power-grid-cybersecurity-assessment

16

configuring-active-directory-tiered-model

16

securing-serverless-functions

16

deploying-edr-agent-with-crowdstrike

16

scanning-infrastructure-with-nessus

16

performing-vlan-hopping-attack

16

configuring-windows-event-logging-for-detection

16

performing-active-directory-vulnerability-assessment

16

configuring-suricata-for-network-monitoring

16

performing-cve-prioritization-with-kev-catalog

16

performing-mobile-app-certificate-pinning-bypass

16

performing-active-directory-bloodhound-analysis

16

deploying-tailscale-for-zero-trust-vpn

16

extracting-iocs-from-malware-samples

16

extracting-windows-event-logs-artifacts

15

securing-kubernetes-on-cloud

15

performing-red-team-with-covenant

15

performing-ai-driven-osint-correlation

15

detecting-anomalous-authentication-patterns

15

exploiting-ms17-010-eternalblue-vulnerability

15

hunting-for-dns-based-persistence

15

performing-serverless-function-security-review

15

performing-external-network-penetration-test

15

securing-aws-iam-permissions

15

detecting-aws-cloudtrail-anomalies

15

performing-active-directory-compromise-investigation

15

performing-cloud-penetration-testing-with-pacu

15

hunting-for-supply-chain-compromise

15

performing-osint-with-spiderfoot

15

securing-container-registry-images

15

detecting-email-account-compromise

15

configuring-aws-verified-access-for-ztna

15

performing-privileged-account-discovery

15

performing-open-source-intelligence-gathering

15

implementing-api-key-security-controls

15

configuring-microsegmentation-for-zero-trust

15

performing-ssl-tls-inspection-configuration

15

implementing-api-abuse-detection-with-rate-limiting

15

containing-active-breach

15

performing-content-security-policy-bypass

14

detecting-insider-threat-behaviors

14

detecting-dll-sideloading-attacks

14

analyzing-cobalt-strike-malleable-profiles

14

securing-helm-chart-deployments

14

performing-red-team-phishing-with-gophish

14

hunting-for-unusual-network-connections

14

integrating-dast-with-owasp-zap-in-pipeline

14

performing-firmware-malware-analysis

14

detecting-anomalies-in-industrial-control-systems

14

detecting-email-forwarding-rules-attack

14

implementing-attack-surface-management

14

securing-remote-access-to-ot-environment

14

generating-threat-intelligence-reports

14

performing-active-directory-forest-trust-attack

14

hunting-credential-stuffing-attacks

14

performing-aws-account-enumeration-with-scout-suite

14

detecting-supply-chain-attacks-in-ci-cd

14

detecting-attacks-on-scada-systems

14

performing-threat-hunting-with-yara-rules

14

performing-packet-injection-attack

14

hunting-for-webshell-activity

14

intercepting-mobile-traffic-with-burpsuite

14

mapping-mitre-attack-techniques

13

performing-kerberoasting-attack

13

configuring-hsm-for-key-storage

13

configuring-snort-ids-for-intrusion-detection

13

implementing-mitre-attack-coverage-mapping

13

integrating-sast-into-github-actions-pipeline

13

deploying-palo-alto-prisma-access-zero-trust

13

performing-threat-landscape-assessment-for-sector

13

deploying-ransomware-canary-files

13

executing-phishing-simulation-campaign

13

implementing-pci-dss-compliance-controls

13

performing-ios-app-security-assessment

13

performing-ssl-certificate-lifecycle-management

13

performing-arp-spoofing-attack-simulation

13

hunting-for-spearphishing-indicators

12

implementing-aes-encryption-for-data-at-rest

12

performing-memory-forensics-with-volatility3

12

profiling-threat-actor-groups

12

performing-network-traffic-analysis-with-zeek

12

configuring-identity-aware-proxy-with-google-iap

12

deploying-osquery-for-endpoint-monitoring

12

performing-thick-client-application-penetration-test

12

implementing-network-access-control

12

performing-purple-team-exercise

12

building-cloud-security-posture-management

12

analyzing-phishing-email-headers

12

performing-service-account-audit

12

performing-oauth-scope-minimization-review

12

detecting-oauth-token-theft

12

implementing-kubernetes-pod-security-standards

12

detecting-suspicious-oauth-application-consent

12

performing-threat-hunting-with-elastic-siem

12

implementing-semgrep-for-custom-sast-rules

12

performing-sca-dependency-scanning-with-snyk

12

hunting-for-dcsync-attacks

12

detecting-s3-data-exfiltration-attempts

12

hardening-windows-endpoint-with-cis-benchmark

12

detecting-business-email-compromise

12

performing-authenticated-scan-with-openvas

12

securing-azure-with-microsoft-defender

12

detecting-privilege-escalation-attempts

12

detecting-broken-object-property-level-authorization

12

performing-endpoint-forensics-investigation

12

implementing-llm-guardrails-for-security

12

detecting-arp-poisoning-in-network-traffic

12

hunting-for-anomalous-powershell-execution

12

performing-service-account-credential-rotation

11

configuring-ldap-security-hardening

11

implementing-devsecops-security-scanning

11

detecting-fileless-attacks-on-endpoints

11

performing-ot-vulnerability-assessment-with-claroty

11

hunting-for-data-exfiltration-indicators

11

detecting-dns-exfiltration-with-dns-query-analysis

11

detecting-dcsync-attack-in-active-directory

11

implementing-aws-iam-permission-boundaries

11

detecting-lateral-movement-in-network

11

implementing-api-threat-protection-with-apigee

11

performing-yara-rule-development-for-detection

11

implementing-threat-intelligence-lifecycle-management

11

implementing-api-security-testing-with-42crunch

11

detecting-business-email-compromise-with-ai

11

performing-agentless-vulnerability-scanning

11

performing-supply-chain-attack-simulation

11

hunting-for-process-injection-techniques

11

performing-lateral-movement-with-wmiexec

11

performing-linux-log-forensics-investigation

11

performing-cryptographic-audit-of-application

11

detecting-aws-guardduty-findings-automation

11

detecting-container-escape-attempts

11

executing-active-directory-attack-simulation

11

performing-nist-csf-maturity-assessment

11

conducting-mobile-application-penetration-test

11

performing-physical-intrusion-assessment

11

performing-ransomware-response

11

detecting-kerberoasting-attacks

11

performing-ot-vulnerability-scanning-safely

11

eradicating-malware-from-infected-systems

11

performing-mobile-device-forensics-with-cellebrite

11

performing-steganography-detection

11

detecting-pass-the-hash-attacks

11

performing-timeline-reconstruction-with-plaso

11

configuring-multi-factor-authentication-with-duo

11

hunting-for-registry-run-key-persistence

11

hunting-for-dns-tunneling-with-zeek

11

performing-phishing-simulation-with-gophish

10

extracting-config-from-agent-tesla-rat

10

performing-windows-artifact-analysis-with-eric-zimmerman-tools

10

implementing-threat-modeling-with-mitre-attack

10

performing-threat-emulation-with-atomic-red-team

10

configuring-zscaler-private-access-for-ztna

10

implementing-gdpr-data-protection-controls

10

performing-privileged-account-access-review

10

implementing-attack-path-analysis-with-xm-cyber

10

detecting-serverless-function-injection

10

performing-cloud-asset-inventory-with-cartography

10

hunting-for-suspicious-scheduled-tasks

10

implementing-aqua-security-for-container-scanning

10

performing-privacy-impact-assessment

10

implementing-iso-27001-information-security-management

10

performing-container-image-hardening

10

performing-adversary-in-the-middle-phishing-detection

10

implementing-security-chaos-engineering

10

extracting-memory-artifacts-with-rekall

10

correlating-security-events-in-qradar

10

performing-memory-forensics-with-volatility3-plugins

10

implementing-google-workspace-phishing-protection

10

detecting-azure-lateral-movement

10

hunting-for-unusual-service-installations

10

detecting-insider-threat-with-ueba

10

detecting-azure-storage-account-misconfigurations

10

performing-ot-network-security-assessment

10

implementing-anti-phishing-training-program

10

hunting-for-command-and-control-beaconing

10

performing-dynamic-analysis-of-android-app

10

conducting-cloud-infrastructure-penetration-test

10

implementing-zero-trust-network-access

10

performing-kubernetes-cis-benchmark-with-kube-bench

10

detecting-cryptomining-in-cloud

10

detecting-ransomware-precursors-in-network

10

detecting-azure-service-principal-abuse

9

performing-gcp-security-assessment-with-forseti

9

recovering-from-ransomware-attack

9

implementing-network-intrusion-prevention-with-suricata

9

detecting-cloud-threats-with-guardduty

9

implementing-google-workspace-sso-configuration

9

detecting-attacks-on-historian-servers

9

performing-credential-access-with-lazagne

9

securing-container-registry-with-harbor

9

hunting-for-ntlm-relay-attacks

9

performing-malware-persistence-investigation

9

performing-malware-hash-enrichment-with-virustotal

9

implementing-vulnerability-management-with-greenbone

9

performing-plc-firmware-security-analysis

9

implementing-zero-trust-in-cloud

9

implementing-cloud-vulnerability-posture-management

9

hunting-for-cobalt-strike-beacons

9

implementing-zero-trust-for-saas-applications

9

performing-ransomware-tabletop-exercise

9

implementing-network-segmentation-with-firewall-zones

9

performing-static-malware-analysis-with-pe-studio

9

hunting-for-persistence-mechanisms-in-windows

9

performing-dns-enumeration-and-zone-transfer

9

detecting-dnp3-protocol-anomalies

9

hunting-for-data-staging-before-exfiltration

9

detecting-deepfake-audio-in-vishing-attacks

9

investigating-phishing-email-incident

9

implementing-web-application-logging-with-modsecurity

9

detecting-network-scanning-with-ids-signatures

9

implementing-alert-fatigue-reduction

9

detecting-credential-dumping-techniques

9

securing-historian-server-in-ot-environment

9

performing-endpoint-vulnerability-remediation

9

performing-threat-intelligence-sharing-with-misp

9

detecting-golden-ticket-attacks-in-kerberos-logs

9

implementing-cisa-zero-trust-maturity-model

9

performing-iot-security-assessment

9

performing-automated-malware-analysis-with-cape

9

detecting-modbus-command-injection-attacks

9

performing-indicator-lifecycle-management

9

hunting-for-lateral-movement-via-wmi

9

performing-disk-forensics-investigation

9

hunting-for-registry-persistence-mechanisms

9

performing-asset-criticality-scoring-for-vulns

9

performing-malware-triage-with-yara

9

detecting-network-anomalies-with-zeek

9

deploying-decoy-files-for-ransomware-detection

9

implementing-network-segmentation-for-ot

8

performing-scada-hmi-security-assessment

8

detecting-exfiltration-over-dns-with-zeek

8

implementing-dmarc-dkim-spf-email-security

8

hunting-for-scheduled-task-persistence

8

performing-purple-team-atomic-testing

8

detecting-shadow-it-cloud-usage

8

implementing-google-workspace-admin-security

8

implementing-application-whitelisting-with-applocker

8

performing-kubernetes-etcd-security-assessment

8

hunting-for-persistence-via-wmi-subscriptions

8

implementing-network-access-control-with-cisco-ise

8

implementing-github-advanced-security-for-code-scanning

8

performing-cloud-native-forensics-with-falco

8

detecting-port-scanning-with-fail2ban

8

implementing-rsa-key-pair-management

8

performing-bandwidth-throttling-attack-simulation

8

implementing-mobile-application-management

8

performing-malware-ioc-extraction

8

implementing-privileged-session-monitoring

8

performing-fuzzing-with-aflplusplus

8

implementing-network-policies-for-kubernetes

8

hunting-for-living-off-the-cloud-techniques

8

performing-dns-tunneling-detection

8

performing-docker-bench-security-assessment

8

hunting-for-shadow-copy-deletion

8

deploying-software-defined-perimeter

8

implementing-infrastructure-as-code-security-scanning

8

detecting-lateral-movement-with-splunk

8

detecting-container-escape-with-falco-rules

8

hunting-for-domain-fronting-c2-traffic

8

performing-soap-web-service-security-testing

8

performing-soc-tabletop-exercise

8

performing-firmware-extraction-with-binwalk

8

processing-stix-taxii-feeds

8

performing-log-analysis-for-forensic-investigation

8

hunting-for-defense-evasion-via-timestomping

8

hunting-for-t1098-account-manipulation

8

implementing-siem-correlation-rules-for-apt

8

detecting-fileless-malware-techniques

8

performing-paste-site-monitoring-for-credentials

8

performing-ip-reputation-analysis-with-shodan

8

implementing-secrets-scanning-in-ci-cd

8

deploying-active-directory-honeytokens

8

hunting-for-startup-folder-persistence

8

implementing-secrets-management-with-vault

8

hunting-for-lolbins-execution-in-endpoint-logs

8

evaluating-threat-intelligence-platforms

8

implementing-end-to-end-encryption-for-messaging

8

detecting-aws-credential-exposure-with-trufflehog

8

performing-dynamic-analysis-with-any-run

8

detecting-bluetooth-low-energy-attacks

8

detecting-process-injection-techniques

8

implementing-aws-config-rules-for-compliance

8

implementing-anti-ransomware-group-policy

8

implementing-ddos-mitigation-with-cloudflare

7

detecting-golden-ticket-forgery

7

detecting-qr-code-phishing-with-email-security

7

investigating-insider-threat-indicators

7

performing-cloud-log-forensics-with-athena

7

implementing-next-generation-firewall-with-palo-alto

7

implementing-pod-security-admission-controller

7

implementing-patch-management-for-ot-systems

7

implementing-hashicorp-vault-dynamic-secrets

7

implementing-stix-taxii-feed-integration

7

performing-access-review-and-certification

7

detecting-container-drift-at-runtime

7

detecting-suspicious-powershell-execution

7

performing-oil-gas-cybersecurity-assessment

7

implementing-ransomware-backup-strategy

7

implementing-rbac-hardening-for-kubernetes

7

performing-false-positive-reduction-in-siem

7

implementing-kubernetes-network-policy-with-calico

7

detecting-beaconing-patterns-with-zeek

7

performing-bluetooth-security-assessment

7

performing-sqlite-database-forensics

7

implementing-network-traffic-analysis-with-arkime

7

detecting-insider-data-exfiltration-via-dlp

7

detecting-typosquatting-packages-in-npm-pypi

7

implementing-zero-trust-dns-with-nextdns

7

performing-ics-asset-discovery-with-claroty

7

managing-intelligence-lifecycle

7

performing-cloud-forensics-with-aws-cloudtrail

7

performing-container-escape-detection

7

detecting-compromised-cloud-credentials

7

performing-lateral-movement-detection

7

implementing-gdpr-data-subject-access-request

7

performing-insider-threat-investigation

7

implementing-network-traffic-baselining

7

auditing-kubernetes-rbac-permissions

7

performing-ioc-enrichment-automation

7

performing-cloud-incident-containment-procedures

7

performing-cloud-forensics-investigation

7

implementing-patch-management-workflow

7

implementing-ot-network-traffic-analysis-with-nozomi

7

implementing-endpoint-detection-with-wazuh

7

hunting-for-dcom-lateral-movement

7

hunting-for-living-off-the-land-binaries

7

detecting-service-account-abuse

7

performing-dmarc-policy-enforcement-rollout

7

implementing-zero-knowledge-proof-for-authentication

7

hunting-for-beaconing-with-frequency-analysis

7

detecting-process-hollowing-technique

7

performing-gcp-penetration-testing-with-gcpbucketbrute

7

implementing-gcp-binary-authorization

7

implementing-vulnerability-remediation-sla

6

implementing-privileged-access-management-with-cyberark

6

implementing-endpoint-dlp-controls

6

detecting-living-off-the-land-with-lolbas

6

implementing-passwordless-auth-with-microsoft-entra

6

implementing-honeytokens-for-breach-detection

6

implementing-memory-protection-with-dep-aslr

6

implementing-siem-use-case-tuning

6

implementing-zero-trust-network-access-with-zscaler

6

investigating-ransomware-attack-artifacts

6

detecting-spearphishing-with-email-gateway

6

implementing-zero-trust-with-hashicorp-boundary

6

implementing-cloud-waf-rules

6

detecting-modbus-protocol-anomalies

6

implementing-soar-automation-with-phantom

6

implementing-runtime-application-self-protection

6

implementing-epss-score-for-vulnerability-prioritization

6

detecting-pass-the-ticket-attacks

6

implementing-pam-for-database-access

6

implementing-gcp-vpc-firewall-rules

6

implementing-azure-defender-for-cloud

6

implementing-policy-as-code-with-open-policy-agent

6

detecting-mimikatz-execution-patterns

6

implementing-aws-security-hub-compliance

6

implementing-identity-verification-for-zero-trust

6

detecting-privilege-escalation-in-kubernetes-pods

6

managing-cloud-identity-with-okta

6

implementing-ransomware-kill-switch-detection

6

performing-brand-monitoring-for-impersonation

6

performing-post-quantum-cryptography-migration

6

detecting-rdp-brute-force-attacks

6

implementing-canary-tokens-for-network-intrusion

6

implementing-aws-security-hub

6

performing-hardware-security-module-integration

6

performing-alert-triage-with-elastic-siem

6

detecting-stuxnet-style-attacks

6

performing-file-carving-with-foremost

6

detecting-living-off-the-land-attacks

6

recovering-deleted-files-with-photorec

6

implementing-beyondcorp-zero-trust-access-model

6

implementing-azure-ad-privileged-identity-management

6

implementing-soar-playbook-with-palo-alto-xsoar

6

performing-cloud-storage-forensic-acquisition

6

implementing-code-signing-for-artifacts

6

implementing-identity-governance-with-sailpoint

5

implementing-scim-provisioning-with-okta

5

implementing-fuzz-testing-in-cicd-with-aflplusplus

5

implementing-immutable-backup-with-restic

5

detecting-t1055-process-injection-with-sysmon

5

implementing-data-loss-prevention-with-microsoft-purview

5

performing-entitlement-review-with-sailpoint-iiq

5

implementing-passwordless-authentication-with-fido2

5

implementing-network-deception-with-honeypots

5

detecting-mobile-malware-behavior

5

implementing-bgp-security-with-rpki

5

implementing-mimecast-targeted-attack-protection

5

implementing-velociraptor-for-ir-collection

5

implementing-vulnerability-sla-breach-alerting

5

detecting-command-and-control-over-dns

5

performing-cloud-native-threat-hunting-with-aws-detective

5

implementing-gcp-organization-policy-constraints

5

detecting-wmi-persistence

5

implementing-container-network-policies-with-calico

5

implementing-aws-macie-for-data-classification

5

implementing-siem-use-cases-for-detection

5

implementing-privileged-access-workstation

5

performing-deception-technology-deployment

5

implementing-cloud-workload-protection

5

implementing-log-integrity-with-blockchain

5

implementing-rapid7-insightvm-for-scanning

5

implementing-aws-nitro-enclave-security

5

implementing-browser-isolation-for-zero-trust

5

implementing-supply-chain-security-with-in-toto

5

performing-s7comm-protocol-security-analysis

5

detecting-evasion-techniques-in-endpoint-logs

5

implementing-email-sandboxing-with-proofpoint

5

performing-log-source-onboarding-in-siem

5

implementing-iec-62443-security-zones

5

performing-initial-access-with-evilginx3

5

implementing-cloud-security-posture-management

5

implementing-image-provenance-verification-with-cosign

5

implementing-ticketing-system-for-incidents

5

performing-cloud-penetration-testing

5

implementing-cloud-trail-log-analysis

4

implementing-proofpoint-email-security-gateway

4

implementing-file-integrity-monitoring-with-aide

4

implementing-dragos-platform-for-ot-monitoring

4

implementing-container-image-minimal-base-with-distroless

4

implementing-mtls-for-zero-trust-services

4

implementing-sigstore-for-software-signing

4

implementing-hardware-security-key-authentication

4

implementing-zero-standing-privilege-with-cyberark

4

implementing-digital-signatures-with-ed25519

4

implementing-device-posture-assessment-in-zero-trust

4

implementing-saml-sso-with-okta

4

implementing-log-forwarding-with-fluentd

4

implementing-diamond-model-analysis

4

implementing-security-monitoring-with-datadog

4

detecting-rootkit-activity

4

implementing-nerc-cip-compliance-controls

4

implementing-conduit-security-for-ot-remote-access

4

implementing-just-in-time-access-provisioning

4

implementing-usb-device-control-policy

4

implementing-taxii-server-with-opentaxii

4

detecting-t1003-credential-dumping-with-edr

4

implementing-syslog-centralization-with-rsyslog

4

implementing-disk-encryption-with-bitlocker

4

detecting-ntlm-relay-with-event-correlation

4

performing-access-recertification-with-saviynt

4

implementing-security-information-sharing-with-stix2

4

implementing-conditional-access-policies-azure-ad

4

containing-active-security-breach

4

implementing-cloud-dlp-for-data-protection

4

implementing-microsegmentation-with-guardicore

4

detecting-t1548-abuse-elevation-control-mechanism

4

implementing-ot-incident-response-playbook

4

implementing-zero-trust-with-beyondcorp

4

implementing-envelope-encryption-with-aws-kms

4

implementing-soar-playbook-for-phishing

4

implementing-honeypot-for-ransomware-detection

4

detecting-ransomware-encryption-behavior

4

implementing-opa-gatekeeper-for-policy-enforcement

4

implementing-runtime-security-with-tetragon

4

implementing-continuous-security-validation-with-bas

4

implementing-deception-based-detection-with-canarytoken

4

implementing-ics-firewall-with-tofino

3

detecting-malicious-scheduled-tasks-with-sysmon

3

implementing-delinea-secret-server-for-pam

3

monitoring-scada-modbus-traffic-anomalies

3

implementing-purdue-model-network-segmentation

3

detecting-misconfigured-azure-storage

3

implementing-ebpf-security-monitoring

3

detecting-cloud-cryptomining-activity

2

hunting-living-off-the-land-binaries

2

performing-ransomware-incident-response

2

detecting-lateral-movement-with-zeek

2

implementing-threat-intelligence-platform

1

implementing-rbac-for-kubernetes-cluster

1

hunting-for-webshells-in-web-servers

1

detecting-golden-ticket-attacks

1

executing-diamond-model-analysis

1