Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications,
Detects and analyzes process injection techniques used by malware including classic DLL injection, process hollowing,
Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation,
Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct
Analyze the NTFS Master File Table ($MFT) to recover metadata and content of deleted files by examining MFT record
Analyzes bootkit and advanced rootkit malware that infects the Master Boot Record (MBR), Volume Boot Record
Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis,
Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant
Implementing and auditing GCP VPC firewall rules to enforce network segmentation, restrict ingress and egress
Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic
Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction,
Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate
This skill covers implementing North American Electric Reliability Corporation Critical Infrastructure Protection
This skill covers implementing Software Composition Analysis (SCA) using Snyk to detect vulnerable open-source
This skill details how to conduct cloud security audits using Center for Internet Security benchmarks for AWS,
This skill covers implementing code signing for build artifacts to ensure integrity and authenticity throughout
This skill covers implementing a structured patch management program for OT/ICS environments where traditional
This skill covers performing vulnerability assessments in OT environments using the Claroty xDome platform for
This skill covers implementing automated security scanning for Infrastructure as Code (IaC) templates using
This skill covers conducting cybersecurity assessments specific to oil and gas facilities including upstream
This skill covers hardening container images by minimizing attack surface, removing unnecessary packages, implementing
This skill guides organizations through implementing zero trust architecture in cloud environments following
This skill instructs security practitioners on deploying Microsoft Defender for Cloud as a cloud-native application
This skill covers integrating OWASP ZAP (Zed Attack Proxy) for Dynamic Application Security Testing in CI/CD
This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container
Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end
This skill covers implementing Okta as a centralized identity provider for cloud environments, configuring SSO
This skill teaches security teams how to deploy and operationalize Amazon GuardDuty for continuous threat detection
This skill covers deploying Microsoft Sentinel as a cloud-native SIEM and SOAR platform for centralized security
This skill covers implementing Gitleaks for detecting and preventing hardcoded secrets in git repositories.
This skill covers hardening managed Kubernetes clusters on EKS, AKS, and GKE by implementing Pod Security Standards,
This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
This skill covers implementing secure remote access to OT/ICS environments for operators, engineers, and vendors
This skill guides practitioners through hardening AWS Identity and Access Management configurations to enforce
This skill covers hardening and securing process historian servers (OSIsoft PI, Honeywell PHD, GE Proficy, AVEVA
This skill covers deploying HashiCorp Vault for centralized secrets management across cloud environments, including
This skill covers designing and implementing security zones and conduits for industrial automation and control
This skill teaches security teams how to detect and respond to unauthorized cryptocurrency mining operations
This skill covers deploying and tuning Web Application Firewall rules on AWS WAF, Azure WAF, and Cloudflare
This skill covers detecting sophisticated cyber-physical attacks that follow the Stuxnet attack pattern of modifying
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions - Govern,…
This skill covers implementing Open Policy Agent (OPA) and Gatekeeper for policy-as-code enforcement in Kubernetes
This skill covers integrating Static Application Security Testing (SAST) tools—CodeQL and Semgrep—into GitHub
This skill outlines methodologies for performing authorized penetration testing against AWS, Azure, and GCP
This skill covers analyzing Programmable Logic Controller (PLC) firmware for security vulnerabilities including
ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).
This skill covers conducting comprehensive security assessments of Operational Technology (OT) networks including
This skill covers deploying AWS Security Hub as a centralized cloud security posture management platform that
This skill covers implementing network segmentation in Operational Technology environments using VLANs, industrial
This skill covers conducting cybersecurity assessments of electric power grid infrastructure including generation
This skill covers detecting cyber attacks targeting Supervisory Control and Data Acquisition (SCADA) systems
This skill covers deploying anomaly detection systems for industrial control environments using machine learning
This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,
This skill provides step-by-step procedures for identifying and remediating Amazon S3 bucket misconfigurations
This skill covers detecting anomalies in Modbus/TCP and Modbus RTU communications in industrial control systems.