mukul975/anthropic-cybersecurity-skills
Skill
Installs
acquiring-disk-image-with-dd-and-dcfldd
108
analyzing-api-gateway-access-logs
95
analyzing-android-malware-with-apktool
90
analyzing-cyber-kill-chain
84
analyzing-browser-forensics-with-hindsight
79
analyzing-active-directory-acl-abuse
78
analyzing-email-headers-for-phishing-investigation
75
analyzing-command-and-control-communication
75
conducting-api-security-testing
74
analyzing-cloud-storage-access-patterns
73
analyzing-network-traffic-with-wireshark
72
analyzing-certificate-transparency-for-phishing
70
analyzing-apt-group-with-mitre-navigator
69
analyzing-linux-audit-logs-for-intrusion
69
analyzing-azure-activity-logs-for-threats
68
analyzing-docker-container-forensics
68
analyzing-dns-logs-for-exfiltration
67
analyzing-network-packets-with-scapy
65
analyzing-linux-kernel-rootkits
65
testing-for-xss-vulnerabilities
64
conducting-network-penetration-test
64
analyzing-malicious-url-with-urlscan
64
performing-web-application-penetration-test
64
analyzing-network-traffic-of-malware
63
analyzing-ios-app-security-with-objection
62
analyzing-network-traffic-for-incidents
61
testing-jwt-token-security
61
exploiting-sql-injection-vulnerabilities
61
reverse-engineering-android-malware-with-jadx
61
testing-api-security-with-owasp-top-10
60
analyzing-bootkit-and-rootkit-samples
60
analyzing-linux-elf-malware
60
analyzing-indicators-of-compromise
58
analyzing-linux-system-artifacts
58
analyzing-disk-image-with-autopsy
57
conducting-external-reconnaissance-with-osint
57
analyzing-campaign-attribution-evidence
57
analyzing-ethereum-smart-contract-vulnerabilities
57
analyzing-kubernetes-audit-logs
56
analyzing-network-flow-data-with-netflow
55
analyzing-network-covert-channels-in-malware
54
analyzing-malware-sandbox-evasion-techniques
54
analyzing-threat-intelligence-feeds
53
analyzing-golang-malware-with-ghidra
52
analyzing-memory-dumps-with-volatility
52
analyzing-malicious-pdf-with-peepdf
52
exploiting-server-side-request-forgery
52
analyzing-heap-spray-exploitation
51
analyzing-cobaltstrike-malleable-c2-profiles
51
testing-for-xxe-injection-vulnerabilities
51
analyzing-cobalt-strike-beacon-configuration
51
analyzing-powershell-script-block-logging
50
analyzing-threat-actor-ttps-with-mitre-attack
50
analyzing-office365-audit-logs-for-compromise
50
performing-soc2-type2-audit-preparation
49
exploiting-sql-injection-with-sqlmap
49
testing-api-authentication-weaknesses
49
analyzing-malware-persistence-with-autoruns
49
analyzing-outlook-pst-for-email-forensics
49
testing-for-xss-vulnerabilities-with-burpsuite
48
collecting-open-source-intelligence
48
testing-api-for-broken-object-level-authorization
48
analyzing-web-server-logs-for-intrusion
48
analyzing-malware-family-relationships-with-malpedia
47
testing-for-sensitive-data-exposure
47
analyzing-malware-behavior-with-cuckoo-sandbox
47
analyzing-windows-event-logs-in-splunk
47
analyzing-macro-malware-in-office-documents
47
bypassing-authentication-with-forced-browsing
47
conducting-mobile-app-penetration-test
47
deobfuscating-javascript-malware
46
testing-for-json-web-token-vulnerabilities
46
analyzing-mft-for-deleted-file-recovery
46
analyzing-security-logs-with-splunk
45
performing-web-application-vulnerability-triage
45
conducting-cloud-penetration-testing
45
testing-for-host-header-injection
45
analyzing-powershell-empire-artifacts
45
testing-oauth2-implementation-flaws
44
conducting-full-scope-red-team-engagement
44
analyzing-memory-forensics-with-lime-and-volatility
44
testing-for-open-redirect-vulnerabilities
44
analyzing-ransomware-leak-site-intelligence
44
testing-cors-misconfiguration
44
analyzing-lnk-file-and-jump-list-artifacts
44
testing-for-broken-access-control
44
analyzing-ransomware-encryption-mechanisms
43
exploiting-idor-vulnerabilities
42
exploiting-api-injection-vulnerabilities
42
analyzing-packed-malware-with-upx-unpacker
42
auditing-aws-s3-bucket-permissions
41
analyzing-pdf-malware-with-pdfid
41
analyzing-ransomware-network-indicators
41
analyzing-threat-actor-ttps-with-mitre-navigator
41
analyzing-threat-landscape-with-misp
40
analyzing-typosquatting-domains-with-dnstwist
40
testing-for-xml-injection-vulnerabilities
40
analyzing-tls-certificate-transparency-logs
39
analyzing-supply-chain-malware-artifacts
39
performing-web-application-firewall-bypass
39
analyzing-persistence-mechanisms-in-linux
38
exploiting-nosql-injection-vulnerabilities
38
analyzing-prefetch-files-for-execution-history
37
exploiting-http-request-smuggling
37
building-vulnerability-scanning-workflow
37
testing-for-business-logic-vulnerabilities
36
testing-mobile-api-authentication
36
conducting-wireless-network-penetration-test
36
exploiting-websocket-vulnerabilities
35
performing-web-application-scanning-with-nikto
35
conducting-internal-reconnaissance-with-bloodhound-ce
35
analyzing-usb-device-connection-history
35
exploiting-oauth-misconfiguration
35
exploiting-template-injection-vulnerabilities
34
testing-for-email-header-injection
34
testing-api-for-mass-assignment-vulnerability
34
auditing-azure-active-directory-configuration
34
conducting-internal-network-penetration-test
34
analyzing-windows-prefetch-with-python
34
analyzing-windows-amcache-artifacts
33
analyzing-slack-space-and-file-system-artifacts
33
scanning-network-with-nmap-advanced
33
building-soc-playbook-for-ransomware
33
testing-websocket-api-security
33
analyzing-windows-registry-for-artifacts
32
exploiting-race-condition-vulnerabilities
32
conducting-pass-the-ticket-attack
32
building-incident-response-playbook
32
exploiting-mass-assignment-in-rest-apis
32
analyzing-sbom-for-supply-chain-vulnerabilities
32
exploiting-insecure-deserialization
31
auditing-gcp-iam-permissions
31
building-soc-metrics-and-kpi-tracking
31
building-threat-intelligence-platform
31
auditing-kubernetes-cluster-rbac
31
exploiting-prototype-pollution-in-javascript
31
reverse-engineering-ios-app-with-frida
30
building-attack-pattern-library-from-cti-reports
30
conducting-cloud-incident-response
30
analyzing-windows-shellbag-artifacts
30
performing-web-cache-poisoning-attack
30
auditing-cloud-with-cis-benchmarks
30
analyzing-windows-lnk-files-for-artifacts
29
building-automated-malware-submission-pipeline
29
auditing-terraform-infrastructure-for-security
29
deobfuscating-powershell-obfuscated-malware
29
performing-web-cache-deception-attack
29
exploiting-jwt-algorithm-confusion-attack
29
building-threat-actor-profile-from-osint
29
conducting-social-engineering-penetration-test
29
triaging-security-incident
29
building-vulnerability-dashboard-with-defectdojo
29
building-c2-infrastructure-with-sliver-framework
29
exploiting-broken-function-level-authorization
29
building-red-team-c2-infrastructure-with-havoc
29
performing-ssrf-vulnerability-exploitation
29
configuring-oauth2-authorization-flow
29
building-threat-intelligence-feed-integration
28
building-adversary-infrastructure-tracking-system
28
building-vulnerability-exception-tracking-system
28
building-soc-escalation-matrix
28
exploiting-active-directory-certificate-services-esc1
28
building-incident-response-dashboard
28
conducting-post-incident-lessons-learned
27
building-detection-rule-with-splunk-spl
27
building-malware-incident-communication-template
27
performing-api-rate-limiting-bypass
27
automating-ioc-enrichment
27
hardening-docker-containers-for-production
27
building-detection-rules-with-sigma
27
detecting-api-enumeration-attacks
27
collecting-threat-intelligence-with-misp
26
performing-graphql-security-assessment
26
conducting-man-in-the-middle-attack-simulation
26
performing-csrf-attack-simulation
26
exploiting-type-juggling-vulnerabilities
26
executing-red-team-engagement-planning
26
extracting-browser-history-artifacts
26
performing-api-security-testing-with-postman
26
conducting-domain-persistence-with-dcsync
26
performing-network-traffic-analysis-with-tshark
25
exploiting-broken-link-hijacking
25
reverse-engineering-malware-with-ghidra
25
performing-vulnerability-scanning-with-nessus
25
conducting-malware-incident-response
25
analyzing-ransomware-payment-wallets
25
triaging-security-incident-with-ir-playbook
25
exploiting-deeplink-vulnerabilities
25
conducting-phishing-incident-response
24
building-threat-hunt-hypothesis-framework
24
exploiting-active-directory-with-bloodhound
24
triaging-vulnerabilities-with-ssvc-framework
24
tracking-threat-actor-infrastructure
24
performing-active-directory-penetration-test
24
executing-red-team-exercise
24
prioritizing-vulnerabilities-with-cvss-scoring
24
performing-wifi-password-cracking-with-aircrack
23
testing-android-intents-for-vulnerabilities
23
conducting-social-engineering-pretext-call
23
analyzing-uefi-bootkit-persistence
23
exploiting-excessive-data-exposure-in-api
23
building-cloud-siem-with-sentinel
23
collecting-indicators-of-compromise
23
building-threat-intelligence-enrichment-in-splunk
23
exploiting-kerberoasting-with-impacket
23
building-vulnerability-aging-and-sla-tracking
23
exploiting-vulnerabilities-with-metasploit-framework
23
exploiting-insecure-data-storage-in-mobile
23
performing-jwt-none-algorithm-attack
22
exploiting-ipv6-vulnerabilities
22
performing-ssl-tls-security-assessment
22
exploiting-bgp-hijacking-vulnerabilities
22
conducting-memory-forensics-with-volatility
22
triaging-security-alerts-in-splunk
22
building-incident-timeline-with-timesketch
22
building-ioc-enrichment-pipeline-with-opencti
22
building-identity-federation-with-saml-azure-ad
22
scanning-docker-images-with-trivy
22
configuring-pfsense-firewall-rules
22
performing-subdomain-enumeration-with-subfinder
22
building-identity-governance-lifecycle-process
21
performing-api-inventory-and-discovery
21
collecting-volatile-evidence-from-compromised-host
21
auditing-tls-certificate-transparency-logs
21
configuring-network-segmentation-with-vlans
21
performing-hash-cracking-with-hashcat
21
building-ioc-defanging-and-sharing-pipeline
20
building-role-mining-for-rbac-optimization
20
building-devsecops-pipeline-with-gitlab-ci
20
performing-graphql-introspection-attack
20
conducting-spearphishing-simulation-campaign
20
building-phishing-reporting-button-workflow
19
reverse-engineering-rust-malware
19
configuring-tls-1-3-for-secure-communications
19
performing-directory-traversal-testing
19
securing-api-gateway-with-aws-waf
19
detecting-ai-model-prompt-injection-attacks
19
scanning-containers-with-trivy-in-cicd
19
securing-github-actions-workflows
19
configuring-host-based-intrusion-detection
19
building-threat-feed-aggregation-with-misp
19
performing-network-forensics-with-wireshark
18
scanning-container-images-with-grype
18
implementing-api-rate-limiting-and-throttling
18
performing-api-fuzzing-with-restler
18
exploiting-constrained-delegation-abuse
18
validating-backup-integrity-for-recovery
18
building-ransomware-playbook-with-cisa-framework
18
extracting-credentials-from-memory-dump
18
configuring-certificate-authority-with-openssl
18
performing-kubernetes-penetration-testing
18
performing-binary-exploitation-analysis
18
hardening-docker-daemon-configuration
18
performing-dark-web-monitoring-for-threats
18
configuring-windows-defender-advanced-settings
17
performing-privilege-escalation-on-linux
17
exploiting-nopac-cve-2021-42278-42287
17
performing-authenticated-vulnerability-scan
17
hardening-linux-endpoint-with-cis-benchmark
17
exploiting-smb-vulnerabilities-with-metasploit
17
performing-ssl-stripping-attack
17
performing-privilege-escalation-assessment
17
performing-container-security-scanning-with-trivy
17
performing-network-packet-capture-analysis
17
performing-http-parameter-pollution-attack
17
reverse-engineering-ransomware-encryption-routine
17
building-patch-tuesday-response-process
17
implementing-api-security-posture-management
16
performing-power-grid-cybersecurity-assessment
16
configuring-active-directory-tiered-model
16
performing-security-headers-audit
16
detecting-sql-injection-via-waf-logs
16
implementing-api-schema-validation-security
16
performing-wireless-network-penetration-test
16
deploying-cloudflare-access-for-zero-trust
16
monitoring-darkweb-sources
16
exploiting-zerologon-vulnerability-cve-2020-1472
16
implementing-jwt-signing-and-verification
16
reverse-engineering-dotnet-malware-with-dnspy
16
configuring-suricata-for-network-monitoring
16
hunting-advanced-persistent-threats
16
detecting-shadow-api-endpoints
16
performing-threat-modeling-with-owasp-threat-dragon
16
testing-ransomware-recovery-procedures
16
implementing-secret-scanning-with-gitleaks
16
correlating-threat-campaigns
15
extracting-windows-event-logs-artifacts
15
implementing-api-gateway-security-controls
15
performing-clickjacking-attack-test
15
performing-android-app-static-analysis-with-mobsf
15
configuring-aws-verified-access-for-ztna
15
scanning-kubernetes-manifests-with-kubesec
15
performing-wireless-security-assessment-with-kismet
15
performing-graphql-depth-limit-attack
15
deploying-tailscale-for-zero-trust-vpn
15
extracting-iocs-from-malware-samples
15
securing-aws-lambda-execution-roles
14
performing-blind-ssrf-exploitation
14
securing-serverless-functions
14
deploying-edr-agent-with-crowdstrike
14
scanning-infrastructure-with-nessus
14
exploiting-ms17-010-eternalblue-vulnerability
14
analyzing-cobalt-strike-malleable-profiles
14
hunting-for-dns-based-persistence
14
remediating-s3-bucket-misconfiguration
14
hunting-for-unusual-network-connections
14
performing-external-network-penetration-test
14
integrating-dast-with-owasp-zap-in-pipeline
14
configuring-windows-event-logging-for-detection
14
performing-active-directory-compromise-investigation
14
hunting-for-supply-chain-compromise
14
performing-firmware-malware-analysis
14
performing-osint-with-spiderfoot
14
generating-threat-intelligence-reports
14
performing-second-order-sql-injection
14
performing-user-behavior-analytics
14
configuring-microsegmentation-for-zero-trust
14
performing-ssl-tls-inspection-configuration
14
performing-packet-injection-attack
14
hunting-for-webshell-activity
14
performing-active-directory-bloodhound-analysis
14
detecting-aws-iam-privilege-escalation
14
performing-ai-driven-osint-correlation
13
detecting-dll-sideloading-attacks
13
securing-kubernetes-on-cloud
13
detecting-anomalous-authentication-patterns
13
performing-vlan-hopping-attack
13
configuring-hsm-for-key-storage
13
configuring-snort-ids-for-intrusion-detection
13
integrating-sast-into-github-actions-pipeline
13
securing-container-registry-images
13
detecting-email-account-compromise
13
performing-active-directory-vulnerability-assessment
13
performing-aws-privilege-escalation-assessment
13
performing-active-directory-forest-trust-attack
13
hunting-credential-stuffing-attacks
13
performing-privileged-account-discovery
13
performing-open-source-intelligence-gathering
13
implementing-api-key-security-controls
13
performing-cve-prioritization-with-kev-catalog
13
performing-mobile-app-certificate-pinning-bypass
13
implementing-api-abuse-detection-with-rate-limiting
13
intercepting-mobile-traffic-with-burpsuite
13
containing-active-breach
13
performing-content-security-policy-bypass
12
performing-memory-forensics-with-volatility3
12
detecting-insider-threat-behaviors
12
performing-network-traffic-analysis-with-zeek
12
performing-kerberoasting-attack
12
performing-red-team-with-covenant
12
configuring-identity-aware-proxy-with-google-iap
12
implementing-mitre-attack-coverage-mapping
12
performing-serverless-function-security-review
12
building-cloud-security-posture-management
12
securing-helm-chart-deployments
12
analyzing-phishing-email-headers
12
detecting-aws-cloudtrail-anomalies
12
performing-cloud-penetration-testing-with-pacu
12
deploying-palo-alto-prisma-access-zero-trust
12
detecting-anomalies-in-industrial-control-systems
12
detecting-email-forwarding-rules-attack
12
executing-phishing-simulation-campaign
12
implementing-pci-dss-compliance-controls
12
securing-remote-access-to-ot-environment
12
detecting-supply-chain-attacks-in-ci-cd
12
detecting-privilege-escalation-attempts
12
performing-threat-hunting-with-yara-rules
12
performing-endpoint-forensics-investigation
12
performing-ssl-certificate-lifecycle-management
12
hunting-for-spearphishing-indicators
11
implementing-aes-encryption-for-data-at-rest
11
mapping-mitre-attack-techniques
11
configuring-ldap-security-hardening
11
implementing-devsecops-security-scanning
11
performing-ot-vulnerability-assessment-with-claroty
11
deploying-osquery-for-endpoint-monitoring
11
implementing-network-access-control
11
performing-purple-team-exercise
11
performing-red-team-phishing-with-gophish
11
performing-oauth-scope-minimization-review
11
securing-aws-iam-permissions
11
implementing-kubernetes-pod-security-standards
11
performing-threat-landscape-assessment-for-sector
11
deploying-ransomware-canary-files
11
implementing-attack-surface-management
11
performing-sca-dependency-scanning-with-snyk
11
hunting-for-dcsync-attacks
11
performing-lateral-movement-with-wmiexec
11
hardening-windows-endpoint-with-cis-benchmark
11
conducting-mobile-application-penetration-test
11
performing-physical-intrusion-assessment
11
performing-ot-vulnerability-scanning-safely
11
eradicating-malware-from-infected-systems
11
detecting-attacks-on-scada-systems
11
detecting-broken-object-property-level-authorization
11
detecting-pass-the-hash-attacks
11
implementing-llm-guardrails-for-security
11
hunting-for-anomalous-powershell-execution
11
extracting-config-from-agent-tesla-rat
10
performing-service-account-credential-rotation
10
detecting-fileless-attacks-on-endpoints
10
hunting-for-suspicious-scheduled-tasks
10
hunting-for-data-exfiltration-indicators
10
detecting-dns-exfiltration-with-dns-query-analysis
10
detecting-dcsync-attack-in-active-directory
10
performing-container-image-hardening
10
implementing-aws-iam-permission-boundaries
10
detecting-lateral-movement-in-network
10
detecting-oauth-token-theft
10
performing-yara-rule-development-for-detection
10
implementing-security-chaos-engineering
10
implementing-threat-intelligence-lifecycle-management
10
implementing-api-security-testing-with-42crunch
10
extracting-memory-artifacts-with-rekall
10
performing-memory-forensics-with-volatility3-plugins
10
detecting-business-email-compromise-with-ai
10
performing-threat-hunting-with-elastic-siem
10
performing-agentless-vulnerability-scanning
10
hunting-for-unusual-service-installations
10
performing-supply-chain-attack-simulation
10
implementing-semgrep-for-custom-sast-rules
10
detecting-s3-data-exfiltration-attempts
10
performing-linux-log-forensics-investigation
10
performing-ios-app-security-assessment
10
performing-ot-network-security-assessment
10
performing-cryptographic-audit-of-application
10
performing-aws-account-enumeration-with-scout-suite
10
performing-nist-csf-maturity-assessment
10
conducting-cloud-infrastructure-penetration-test
10
performing-ransomware-response
10
securing-azure-with-microsoft-defender
10
detecting-kerberoasting-attacks
10
performing-kubernetes-cis-benchmark-with-kube-bench
10
performing-steganography-detection
10
configuring-multi-factor-authentication-with-duo
10
hunting-for-registry-run-key-persistence
10
hunting-for-dns-tunneling-with-zeek
10
detecting-ransomware-precursors-in-network
10
detecting-arp-poisoning-in-network-traffic
10
configuring-zscaler-private-access-for-ztna
9
profiling-threat-actor-groups
9
implementing-network-intrusion-prevention-with-suricata
9
performing-cloud-asset-inventory-with-cartography
9
performing-credential-access-with-lazagne
9
hunting-for-ntlm-relay-attacks
9
performing-malware-persistence-investigation
9
performing-thick-client-application-penetration-test
9
performing-plc-firmware-security-analysis
9
implementing-zero-trust-in-cloud
9
performing-service-account-audit
9
implementing-cloud-vulnerability-posture-management
9
implementing-api-threat-protection-with-apigee
9
performing-adversary-in-the-middle-phishing-detection
9
detecting-suspicious-oauth-application-consent
9
correlating-security-events-in-qradar
9
hunting-for-persistence-mechanisms-in-windows
9
implementing-google-workspace-phishing-protection
9
performing-dns-enumeration-and-zone-transfer
9
hunting-for-process-injection-techniques
9
detecting-network-scanning-with-ids-signatures
9
detecting-business-email-compromise
9
hunting-for-command-and-control-beaconing
9
performing-authenticated-scan-with-openvas
9
performing-dynamic-analysis-of-android-app
9
detecting-aws-guardduty-findings-automation
9
detecting-container-escape-attempts
9
executing-active-directory-attack-simulation
9
performing-mobile-device-forensics-with-cellebrite
9
detecting-cryptomining-in-cloud
9
performing-timeline-reconstruction-with-plaso
9
detecting-modbus-command-injection-attacks
9
performing-arp-spoofing-attack-simulation
9
hunting-for-lateral-movement-via-wmi
9
performing-disk-forensics-investigation
9
performing-malware-triage-with-yara
9
detecting-network-anomalies-with-zeek
9
performing-phishing-simulation-with-gophish
8
performing-gcp-security-assessment-with-forseti
8
implementing-network-segmentation-for-ot
8
implementing-threat-modeling-with-mitre-attack
8
performing-threat-emulation-with-atomic-red-team
8
recovering-from-ransomware-attack
8
hunting-for-scheduled-task-persistence
8
implementing-gdpr-data-protection-controls
8
detecting-shadow-it-cloud-usage
8
implementing-google-workspace-sso-configuration
8
performing-privileged-account-access-review
8
implementing-attack-path-analysis-with-xm-cyber
8
performing-kubernetes-etcd-security-assessment
8
implementing-network-access-control-with-cisco-ise
8
performing-cloud-native-forensics-with-falco
8
detecting-port-scanning-with-fail2ban
8
implementing-rsa-key-pair-management
8
implementing-aqua-security-for-container-scanning
8
implementing-mobile-application-management
8
performing-privacy-impact-assessment
8
performing-malware-ioc-extraction
8
performing-malware-hash-enrichment-with-virustotal
8
implementing-privileged-session-monitoring
8
implementing-vulnerability-management-with-greenbone
8
implementing-network-policies-for-kubernetes
8
hunting-for-living-off-the-cloud-techniques
8
performing-dns-tunneling-detection
8
performing-docker-bench-security-assessment
8
hunting-for-shadow-copy-deletion
8
detecting-lateral-movement-with-splunk
8
hunting-for-cobalt-strike-beacons
8
hunting-for-domain-fronting-c2-traffic
8
implementing-zero-trust-for-saas-applications
8
performing-ransomware-tabletop-exercise
8
performing-soc-tabletop-exercise
8
performing-firmware-extraction-with-binwalk
8
implementing-network-segmentation-with-firewall-zones
8
performing-log-analysis-for-forensic-investigation
8
detecting-azure-lateral-movement
8
hunting-for-t1098-account-manipulation
8
detecting-insider-threat-with-ueba
8
detecting-dnp3-protocol-anomalies
8
detecting-azure-storage-account-misconfigurations
8
hunting-for-data-staging-before-exfiltration
8
performing-paste-site-monitoring-for-credentials
8
detecting-deepfake-audio-in-vishing-attacks
8
investigating-phishing-email-incident
8
implementing-anti-phishing-training-program
8
implementing-web-application-logging-with-modsecurity
8
implementing-secrets-scanning-in-ci-cd
8
implementing-alert-fatigue-reduction
8
detecting-credential-dumping-techniques
8
securing-historian-server-in-ot-environment
8
implementing-secrets-management-with-vault
8
hunting-for-lolbins-execution-in-endpoint-logs
8
performing-endpoint-vulnerability-remediation
8
evaluating-threat-intelligence-platforms
8
performing-threat-intelligence-sharing-with-misp
8
implementing-end-to-end-encryption-for-messaging
8
implementing-zero-trust-network-access
8
detecting-golden-ticket-attacks-in-kerberos-logs
8
performing-iot-security-assessment
8
performing-automated-malware-analysis-with-cape
8
performing-indicator-lifecycle-management
8
hunting-for-registry-persistence-mechanisms
8
detecting-azure-service-principal-abuse
7
implementing-ddos-mitigation-with-cloudflare
7
performing-scada-hmi-security-assessment
7
detecting-exfiltration-over-dns-with-zeek
7
performing-purple-team-atomic-testing
7
implementing-google-workspace-admin-security
7
detecting-cloud-threats-with-guardduty
7
performing-cloud-log-forensics-with-athena
7
implementing-next-generation-firewall-with-palo-alto
7
detecting-attacks-on-historian-servers
7
implementing-pod-security-admission-controller
7
detecting-serverless-function-injection
7
implementing-hashicorp-vault-dynamic-secrets
7
implementing-application-whitelisting-with-applocker
7
hunting-for-persistence-via-wmi-subscriptions
7
performing-access-review-and-certification
7
implementing-github-advanced-security-for-code-scanning
7
detecting-suspicious-powershell-execution
7
securing-container-registry-with-harbor
7
performing-oil-gas-cybersecurity-assessment
7
implementing-ransomware-backup-strategy
7
implementing-rbac-hardening-for-kubernetes
7
implementing-iso-27001-information-security-management
7
performing-false-positive-reduction-in-siem
7
performing-fuzzing-with-aflplusplus
7
performing-bluetooth-security-assessment
7
deploying-software-defined-perimeter
7
implementing-network-traffic-analysis-with-arkime
7
implementing-infrastructure-as-code-security-scanning
7
detecting-typosquatting-packages-in-npm-pypi
7
detecting-container-escape-with-falco-rules
7
performing-soap-web-service-security-testing
7
performing-static-malware-analysis-with-pe-studio
7
processing-stix-taxii-feeds
7
hunting-for-defense-evasion-via-timestomping
7
implementing-siem-correlation-rules-for-apt
7
performing-container-escape-detection
7
detecting-fileless-malware-techniques
7
performing-lateral-movement-detection
7
auditing-kubernetes-rbac-permissions
7
performing-ip-reputation-analysis-with-shodan
7
performing-cloud-incident-containment-procedures
7
deploying-active-directory-honeytokens
7
implementing-ot-network-traffic-analysis-with-nozomi
7
hunting-for-startup-folder-persistence
7
hunting-for-living-off-the-land-binaries
7
performing-dmarc-policy-enforcement-rollout
7
detecting-aws-credential-exposure-with-trufflehog
7
performing-dynamic-analysis-with-any-run
7
implementing-cisa-zero-trust-maturity-model
7
detecting-process-injection-techniques
7
implementing-zero-knowledge-proof-for-authentication
7
implementing-aws-config-rules-for-compliance
7
detecting-process-hollowing-technique
7
performing-asset-criticality-scoring-for-vulns
7
implementing-anti-ransomware-group-policy
7
deploying-decoy-files-for-ransomware-detection
7
performing-windows-artifact-analysis-with-eric-zimmerman-tools
6
implementing-privileged-access-management-with-cyberark
6
implementing-endpoint-dlp-controls
6
implementing-dmarc-dkim-spf-email-security
6
detecting-golden-ticket-forgery
6
detecting-qr-code-phishing-with-email-security
6
detecting-living-off-the-land-with-lolbas
6
investigating-insider-threat-indicators
6
implementing-passwordless-auth-with-microsoft-entra
6
implementing-patch-management-for-ot-systems
6
detecting-container-drift-at-runtime
6
detecting-spearphishing-with-email-gateway
6
implementing-zero-trust-with-hashicorp-boundary
6
implementing-cloud-waf-rules
6
detecting-modbus-protocol-anomalies
6
implementing-kubernetes-network-policy-with-calico
6
performing-sqlite-database-forensics
6
implementing-runtime-application-self-protection
6
implementing-epss-score-for-vulnerability-prioritization
6
detecting-insider-data-exfiltration-via-dlp
6
detecting-pass-the-ticket-attacks
6
implementing-pam-for-database-access
6
implementing-zero-trust-dns-with-nextdns
6
implementing-azure-defender-for-cloud
6
implementing-policy-as-code-with-open-policy-agent
6
performing-ics-asset-discovery-with-claroty
6
detecting-mimikatz-execution-patterns
6
implementing-aws-security-hub-compliance
6
managing-intelligence-lifecycle
6
implementing-identity-verification-for-zero-trust
6
detecting-privilege-escalation-in-kubernetes-pods
6
performing-cloud-forensics-with-aws-cloudtrail
6
managing-cloud-identity-with-okta
6
implementing-ransomware-kill-switch-detection
6
performing-brand-monitoring-for-impersonation
6
detecting-rdp-brute-force-attacks
6
detecting-compromised-cloud-credentials
6
implementing-gdpr-data-subject-access-request
6
performing-insider-threat-investigation
6
implementing-network-traffic-baselining
6
implementing-aws-security-hub
6
performing-cloud-forensics-investigation
6
implementing-patch-management-workflow
6
implementing-endpoint-detection-with-wazuh
6
hunting-for-dcom-lateral-movement
6
performing-hardware-security-module-integration
6
detecting-service-account-abuse
6
detecting-stuxnet-style-attacks
6
performing-file-carving-with-foremost
6
detecting-living-off-the-land-attacks
6
detecting-bluetooth-low-energy-attacks
6
implementing-beyondcorp-zero-trust-access-model
6
hunting-for-beaconing-with-frequency-analysis
6
implementing-azure-ad-privileged-identity-management
6
performing-gcp-penetration-testing-with-gcpbucketbrute
6
performing-cloud-storage-forensic-acquisition
6
implementing-gcp-binary-authorization
6
implementing-code-signing-for-artifacts
6
implementing-identity-governance-with-sailpoint
5
implementing-scim-provisioning-with-okta
5
implementing-fuzz-testing-in-cicd-with-aflplusplus
5
implementing-vulnerability-remediation-sla
5
implementing-immutable-backup-with-restic
5
detecting-t1055-process-injection-with-sysmon
5
performing-entitlement-review-with-sailpoint-iiq
5
implementing-stix-taxii-feed-integration
5
implementing-honeytokens-for-breach-detection
5
performing-bandwidth-throttling-attack-simulation
5
implementing-memory-protection-with-dep-aslr
5
implementing-network-deception-with-honeypots
5
implementing-siem-use-case-tuning
5
implementing-zero-trust-network-access-with-zscaler
5
investigating-ransomware-attack-artifacts
5
detecting-beaconing-patterns-with-zeek
5
detecting-mobile-malware-behavior
5
implementing-soar-automation-with-phantom
5
implementing-bgp-security-with-rpki
5
implementing-mimecast-targeted-attack-protection
5
performing-cloud-native-threat-hunting-with-aws-detective
5
implementing-gcp-vpc-firewall-rules
5
detecting-wmi-persistence
5
implementing-container-network-policies-with-calico
5
implementing-aws-macie-for-data-classification
5
implementing-privileged-access-workstation
5
performing-post-quantum-cryptography-migration
5
performing-deception-technology-deployment
5
implementing-canary-tokens-for-network-intrusion
5
implementing-cloud-workload-protection
5
implementing-log-integrity-with-blockchain
5
performing-ioc-enrichment-automation
5
implementing-rapid7-insightvm-for-scanning
5
implementing-aws-nitro-enclave-security
5
implementing-browser-isolation-for-zero-trust
5
implementing-supply-chain-security-with-in-toto
5
performing-s7comm-protocol-security-analysis
5
performing-log-source-onboarding-in-siem
5
implementing-iec-62443-security-zones
5
performing-alert-triage-with-elastic-siem
5
performing-initial-access-with-evilginx3
5
implementing-cloud-security-posture-management
5
recovering-deleted-files-with-photorec
5
implementing-image-provenance-verification-with-cosign
5
performing-cloud-penetration-testing
5
implementing-soar-playbook-with-palo-alto-xsoar
5
implementing-cloud-trail-log-analysis
4
implementing-proofpoint-email-security-gateway
4
implementing-file-integrity-monitoring-with-aide
4
implementing-dragos-platform-for-ot-monitoring
4
implementing-container-image-minimal-base-with-distroless
4
implementing-data-loss-prevention-with-microsoft-purview
4
implementing-mtls-for-zero-trust-services
4
implementing-passwordless-authentication-with-fido2
4
implementing-sigstore-for-software-signing
4
implementing-hardware-security-key-authentication
4
implementing-zero-standing-privilege-with-cyberark
4
implementing-digital-signatures-with-ed25519
4
implementing-device-posture-assessment-in-zero-trust
4
implementing-saml-sso-with-okta
4
implementing-log-forwarding-with-fluentd
4
implementing-diamond-model-analysis
4
implementing-security-monitoring-with-datadog
4
detecting-rootkit-activity
4
implementing-nerc-cip-compliance-controls
4
implementing-conduit-security-for-ot-remote-access
4
implementing-velociraptor-for-ir-collection
4
implementing-vulnerability-sla-breach-alerting
4
detecting-command-and-control-over-dns
4
implementing-just-in-time-access-provisioning
4
implementing-usb-device-control-policy
4
implementing-gcp-organization-policy-constraints
4
detecting-t1003-credential-dumping-with-edr
4
implementing-siem-use-cases-for-detection
4
implementing-disk-encryption-with-bitlocker
4
detecting-ntlm-relay-with-event-correlation
4
performing-access-recertification-with-saviynt
4
containing-active-security-breach
4
implementing-cloud-dlp-for-data-protection
4
implementing-microsegmentation-with-guardicore
4
detecting-t1548-abuse-elevation-control-mechanism
4
implementing-ot-incident-response-playbook
4
implementing-zero-trust-with-beyondcorp
4
detecting-evasion-techniques-in-endpoint-logs
4
implementing-email-sandboxing-with-proofpoint
4
implementing-envelope-encryption-with-aws-kms
4
detecting-ransomware-encryption-behavior
4
implementing-opa-gatekeeper-for-policy-enforcement
4
implementing-ticketing-system-for-incidents
4
implementing-runtime-security-with-tetragon
4
implementing-continuous-security-validation-with-bas
4
implementing-deception-based-detection-with-canarytoken
4
implementing-ics-firewall-with-tofino
3
implementing-taxii-server-with-opentaxii
3
implementing-syslog-centralization-with-rsyslog
3
detecting-malicious-scheduled-tasks-with-sysmon
3
implementing-security-information-sharing-with-stix2
3
implementing-delinea-secret-server-for-pam
3
monitoring-scada-modbus-traffic-anomalies
3
implementing-conditional-access-policies-azure-ad
3
implementing-purdue-model-network-segmentation
3
detecting-misconfigured-azure-storage
3
implementing-soar-playbook-for-phishing
3
implementing-honeypot-for-ransomware-detection
3
implementing-ebpf-security-monitoring
3
detecting-cloud-cryptomining-activity
2
hunting-living-off-the-land-binaries
2
performing-ransomware-incident-response
2
detecting-lateral-movement-with-zeek
2
implementing-threat-intelligence-platform
1
implementing-rbac-for-kubernetes-cluster
1
hunting-for-webshells-in-web-servers
1
detecting-golden-ticket-attacks
1
executing-diamond-model-analysis
1